Hebt u iets om te verkopen?

Official (Isc)2 Guide to the Cissp Cbk

by | HC | Good
Objectstaat:
Goed
Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, ... Meer lezenover objectstaat
3 beschikbaar / 3 verkocht
Verzendkosten:
Gratis Economy Shipping. Details bekijkenvoor verzending
Bevindt zich in: Aurora, Illinois, Verenigde Staten
Levering:
Geschatte levering tussen do, 27 jun en za, 29 jun tot 43230
Bij geschatte leveringsdatums - nieuw venster of tabblad wordt rekening gehouden met de verwerkingstijd van de verkoper, de postcode van de verzendlocatie, de postcode van de bestemming, en het moment van aanvaarding. Geschatte leveringsdatums zijn ook afhankelijk van de geselecteerde verzendservice en de ontvangst van de betalingbetaling ontvangen - nieuw venster of tabblad. De leveringstermijnen kunnen variëren, vooral gedurende piekperiodes.
Retourbeleid:
30 dagen om te retourneren. Verkoper betaalt voor retourzending. Details bekijken- voor meer informatie over retourzendingen
Betalingen:
     

Winkel met vertrouwen

Geld-terug-garantie van eBay
Ontvang het object dat u hebt besteld of krijg uw geld terug. 

Verkopergegevens

Ingeschreven als zakelijke verkoper
De verkoper neemt de volledige verantwoordelijkheid voor deze aanbieding.
eBay-objectnummer:143811871604
Laatst bijgewerkt op 10 jun 2024 05:56:09 CESTAlle herzieningen bekijkenAlle herzieningen bekijken

Specificaties

Objectstaat
Goed
Een boek dat is gelezen, maar zich in goede staat bevindt. De kaft is zeer minimaal beschadigd (er zijn bijvoorbeeld slijtplekken), maar er zijn geen deukjes of scheuren. De harde kaft heeft mogelijk geen stofomslag meer. De boekband vertoont minimale slijtage. De meeste bladzijden zijn onbeschadigd. Er zijn weinig vouwen en scheuren en er is vrijwel geen tekst met potlood onderstreept of met een accentueerstift gemarkeerd. Er is niet in de kantlijn geschreven. Er ontbreken geen bladzijden. Bekijk de aanbieding van de verkoper voor de volledige details en een beschrijving van gebreken. Alle staatdefinities bekijkenwordt in nieuw venster of op nieuw tabblad geopend
Opmerkingen van verkoper
“Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, ...
Binding
Hardcover
Weight
5 lbs
Product Group
Book
IsTextBook
No
ISBN
1482262754
Subject Area
Computers
Publication Name
Official (Isc) 2 Guide to the Cissp Cbk
Publisher
Auerbach Publishers, Incorporated
Item Length
10.4 in
Subject
Security / General, Certification Guides / General, Security / Networking, Information Technology
Publication Year
2015
Series
(Isc) 2 Press Ser.
Type
Textbook
Format
Hardcover
Language
English
Item Height
2.2 in
Author
Adam Gordon
Features
New Edition
Item Weight
84.2 Oz
Item Width
7.3 in
Number of Pages
1304 Pages

Over dit product

Product Information

As a result of a rigorous, methodical process that (ISC) follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC) conducts this process on a regular basis to ensure that the examinations and subsequent training and continuing professional education requirements encompass the topic areas relevant to the roles and responsibilities of today's practicing information security professionals. Refreshed technical content has been added to the official (ISC) CISSP CBK to reflect the most current topics in the information security industry today. Some topics have been expanded (e.g., asset security, security assessment and testing), while other topics have been realigned under different domains. The result is an exam that most accurately reflects the technical and managerial competence required from an experienced information security professional to effectively design, engineer, implement and manage an organization's information security program within an ever-changing security landscape. The domain names have been updated as follows: CISSP Domains, Effective April 15, 2015 Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity) Asset Security (Protecting Security of Assets) Security Engineering (Engineering and Management of Security) Communications and Network Security (Designing and Protecting Network Security) Identity and Access Management (Controlling Access and Managing Identity) Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) Security Operations (Foundational Concepts, Investigations, Incident Management, Disaster Recovery) Software Development Security (Understanding, Applying, and Enforcing Software Security) Some candidates may be wondering how these updates affect training materials for the CISSP credential. As part of the organization's comprehensive education strategy and certifying body best practices, (ISC) training materials do not teach directly to its credential examinations. Rather, (ISC) Education is focused on teaching the core competencies relevant to the roles and responsibilities of today's practicing information security professional. It is designed to refresh and enhance the knowledge of experienced industry professionals.

Product Identifiers

Publisher
Auerbach Publishers, Incorporated
ISBN-10
1482262754
ISBN-13
9781482262759
eBay Product ID (ePID)
201708450

Product Key Features

Number of Pages
1304 Pages
Language
English
Publication Name
Official (Isc) 2 Guide to the Cissp Cbk
Publication Year
2015
Subject
Security / General, Certification Guides / General, Security / Networking, Information Technology
Features
New Edition
Type
Textbook
Subject Area
Computers
Author
Adam Gordon
Series
(Isc) 2 Press Ser.
Format
Hardcover

Dimensions

Item Height
2.2 in
Item Weight
84.2 Oz
Item Length
10.4 in
Item Width
7.3 in

Additional Product Features

Edition Number
4
LCCN
2015-288102
Target Audience
College Audience
Illustrated
Yes
Edition Description
New Edition
Lc Classification Number
Tk5105.59.O438 2015
Table of Content
Domain 1 -- Security & Risk Management Security & Risk Management Confidentiality, Integrity, and Availability Security Governance The Complete and Effective Security Program Compliance Global Legal and Regulatory Issues Understand Professional Ethics Develop and Implement Security Policy Business Continuity (BC) & Disaster Recovery (DR) Requirements Manage Personnel Security Risk Management Concepts Threat Modeling Acquisitions Strategy and Practice Security Education, Training, and Awareness Domain 2 -- Asset Security Asset Security Data Management: Determine and Maintain Ownership Data Standards Longevity and Use Classify Information and Supporting Assets Asset Management Protect Privacy Ensure Appropriate Retention Determine Data Security Controls Standards Selection Domain 3 -- Security Engineering Security Engineering The Engineering Lifecycle Using Security Design Principles Fundamental Concepts of Security Models Information Systems Security Evaluation Models Security Capabilities of Information Systems Vulnerabilities of Security Architectures Database Security Software and System Vulnerabilities and Threats Vulnerabilities in Mobile Systems Vulnerabilities in Embedded Devices and Cyber-Physical Systems The Application and Use of Cryptography Site and Facility Design Considerations Site Planning Implementation and Operation of Facilities Security Domain 4 -- Communications & Network Security Communications & Network Security Secure Network Architecture and Design Implications of Multi-Layer Protocols Converged Protocols Securing Network Components Secure Communication Channels Network Attacks Domain 5 -- Identity & Access Management Identity & Access Management Physical and Logical Access to Assets Identification and Authentication of People and Devices Identity Management Implementation Identity as a Service (IDaaS) Integrate Third-Party Identity Services Implement and Manage Authorization Mechanisms Prevent or Mitigate Access Control Attacks Identity and Access Provisioning Lifecycle Domain 6 -- Security Assessment & Testing Security Assessment & Testing Assessment and Test Strategies Collect Security Process Data Internal and Third-Party Audits Domain 7 -- Security Operations Security Operations Investigations Provisioning of Resources through Configuration Management Resource Protection Incident Response Preventative Measures against Attacks Patch and Vulnerability Management Change and Configuration Management The Disaster Recovery Process Test Plan Review Business Continuity and Other Risk Areas Access Control Personnel Safety Domain 8 -- Security in the Software Development Life Cycle Security in the Software Development Life Cycle Software Development Security Outline Environment and Security Controls Security of the Software Environment Software Protection Mechanisms Assess the Effectiveness of Software Security Assess Software Acquisition Security
Copyright Date
2015

Objectbeschrijving van de verkoper

Informatie van zakelijke verkoper

Thrift Books Global, LLC
TB Thrift Books
18300 Cascade Ave S
Ste 150
98188 Seattle, WA
United States
Contactgegevens weergeven
:liam-Emoc.skoobtfirht@yabe.selas
Ik verklaar dat al mijn verkoopactiviteiten zullen voldoen aan alle wet- en regelgeving van de EU.
ThriftBooks

ThriftBooks

99% positieve feedback
17,8M objecten verkocht
Reageert meestal binnen 24 uur

Gedetailleerde verkopersbeoordelingen

Gemiddelde van de afgelopen 12 maanden

Nauwkeurige beschrijving
4.9
Redelijke verzendkosten
5.0
Verzendtijd
5.0
Communicatie
4.9
Ingeschreven als zakelijke verkoper

Feedback verkoper (5.226.244)

y***y (225)- Feedback gegeven door koper.
Meer dan een jaar geleden
Geverifieerde aankoop
Great find!!
i***k (2321)- Feedback gegeven door koper.
Meer dan een jaar geleden
Geverifieerde aankoop
Perfect transaction.
Alle feedback weergeven