Imagen de portada de Amazon
Imagen de Amazon.com

Certified information Systems security professional: official study guide

Por: Colaborador(es): Tipo de material: TextoTextoIdioma: Español Detalles de publicación: New Jersey, SYBEX; 2021Edición: 9a. EdiciónDescripción: 1248 páginas tablas; gráficos 23x18 cmISBN:
  • 978-1-119-78623-8
Tema(s): Clasificación CDD:
  • 005.8 C467c
Contenidos:
Chapter 1: Security Governance Through Principles and Policies.-Chapter 2: Personnel Security and Risk Management Concepts.-Chapter 3: Business Continuity Planning.-Chapter 4: Laws, Regulations, and Compliance.-Chapter 5: Protecting Security of Assets.-Chapter 6: Cryptography and Symmetric Key Algorithms.-Chapter 7: PKI and Cryptographic Applications.-Chapter 8: Principles of Security Models, Design, and Capabilities.-Chapter 9: Security Vulnerabilities, Threats, and Countermeasures.-Chapter 10: Physical Security Requirements.-Chapter 11: Secure Network Architecture and Components.-Chapter 12: Secure Communications and Network Attacks.-Chapter 13: Managing Identity and Authentication.-Chapter 14: Controlling and Monitoring Access.-Chapter 15: Security Assessment and Testing.-Chapter 16: Managing Security Operations.-Chapter 17: Preventing and Responding to Incidents.-Chapter 18: Disaster Recovery Planning.-Chapter 19: Investigations and Ethics.-Chapter 20: Software Development Security.-Chapter 21: Malicious Code and Application Attacks.-Index-
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libros Libros Unidad Académica de Posgrado Maestría en Ciberseguridad 005.8 C467c 19B01181 (Navegar estantería(Abre debajo)) Disponible 19B01181
Libros Libros Unidad Académica de Posgrado Maestría en Ciberseguridad 005.8 C467c Ej.2 19B01182 (Navegar estantería(Abre debajo)) 2 Disponible 19B01182

incluye índice de contenido

Chapter 1: Security Governance Through Principles and Policies.-Chapter 2: Personnel Security and Risk Management Concepts.-Chapter 3: Business Continuity Planning.-Chapter 4: Laws, Regulations, and Compliance.-Chapter 5: Protecting Security of Assets.-Chapter 6: Cryptography and Symmetric Key Algorithms.-Chapter 7: PKI and Cryptographic Applications.-Chapter 8: Principles of Security Models, Design, and Capabilities.-Chapter 9: Security Vulnerabilities, Threats, and Countermeasures.-Chapter 10: Physical Security Requirements.-Chapter 11: Secure Network Architecture and Components.-Chapter 12: Secure Communications and Network Attacks.-Chapter 13: Managing Identity and Authentication.-Chapter 14: Controlling and Monitoring Access.-Chapter 15: Security Assessment and Testing.-Chapter 16: Managing Security Operations.-Chapter 17: Preventing and Responding to Incidents.-Chapter 18: Disaster Recovery Planning.-Chapter 19: Investigations and Ethics.-Chapter 20: Software Development Security.-Chapter 21: Malicious Code and Application Attacks.-Index-

No hay comentarios en este titulo.

para colocar un comentario.