Libros bestsellers hasta 50% dcto  Ver más

menu

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance (in English)
Type
Physical Book
Language
English
Pages
702
Format
Paperback
Dimensions
22.9 x 15.2 x 3.6 cm
Weight
0.92 kg.
ISBN13
9781839381843

CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance (in English)

Richie Miller (Author) · Pastor Publishing Ltd · Paperback

CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance (in English) - Miller, Richie

Physical Book

$ 33.67

$ 39.99

You save: $ 6.32

16% discount
  • Condition: New
It will be shipped from our warehouse between Thursday, May 23 and Friday, May 24.
You will receive it anywhere in United States between 1 and 3 business days after shipment.

Synopsis "CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance (in English)"

If you want to become a Cybersecurity Professional, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover: Baseline Configuration, Diagrams & IP ManagementData Sovereignty & Data Loss PreventionData Masking, Tokenization & Digital Rights ManagementGeographical Considerations & Cloud Access Security BrokerSecure Protocols, SSL Inspection & HashingAPI Gateways & Recovery SitesHoneypots, Fake Telemetry & DNS SinkholeCloud Storage and Cloud ComputingIaaS, PaaS & SaaSManaged Service Providers, Fog Computing & Edge ComputingVDI, Virtualization & ContainersMicroservices and APIsInfrastructure as Code (IAC) & Software Defined Networking (SDN)Service Integrations and Resource PoliciesEnvironments, Provisioning & DeprovisioningIntegrity Measurement & Code AnalysisSecurity Automation, Monitoring & ValidationSoftware Diversity, Elasticity & ScalabilityDirectory Services, Federation & AttestationTime-Based Passwords, Authentication & TokensProximity Cards, Biometric & Facial RecognitionVein and Gait Analysis & Efficacy RatesGeographically Disperse, RAID & MultipathLoad Balancer, Power Resiliency & ReplicationBackup Execution PoliciesHigh Availability, Redundancy & Fault ToleranceEmbedded Systems & SCADA SecuritySmart Devices / IoT & Special Purpose DevicesHVAC, Aircraft/UAV & MFDsReal Time Operating Systems & Surveillance SystemsBarricades, Mantraps & AlarmsCameras, Video Surveillance & GuardsCable Locks, USB Data Blockers, Safes & FencingMotion Detection / Infrared & Proximity ReadersDemilitarized Zone & Protected Distribution SystemShredding, Pulping & PulverizingDeguassing, Purging & WipingCryptographic Terminology and HistoryDigital Signatures, Key Stretching & HashingQuantum Communications & Elliptic Curve CryptographyQuantum Computing, Cipher Modes & XOR FunctionEncryptions & BlockchainsAsymmetric/Lightweight Encryption & SteganographyCipher Suites, Random & Quantum Random Number GeneratorsSecure Networking ProtocolsHost or Application Security SolutionsCoding, Fuzzing & Quality TestingHow to Implement Secure Network DesignsNetwork Access Control, Port Security & Loop ProtectionSpanning Tree, DHCP Snooping & MAC FilteringAccess Control Lists & Route SecurityIntrusion Detection and PreventionFirewalls & Unified Threat ManagementHow to Install and Configure Wireless SecurityHow to Implement Public Key InfrastructureData Sources to Support an IncidentHow to Assess Organizational SecurityDetection and AnalysisTest Scenarios & SimulationsThreat Intelligence LifecycleMobile Device ManagementDLP, Content Filters & URL FiltersKey Aspects of Digital ForensicsQualitative and Quantitative AnalysisBusiness Impact AnalysisIdentification of Critical SystemsOrder of RestorationContinuity of OperationsPrivacy and Sensitive Data ConceptsIncident Notification and EscalationData ClassificationPrivacy-enhancing TechnologiesData Owners & ResponsibilitiesInformation LifecycleBUY THIS BOOK NOW AND GET STARTED TODAY!

Customers reviews

More customer reviews
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Frequently Asked Questions about the Book

All books in our catalog are Original.
The book is written in English.
The binding of this edition is Paperback.

Questions and Answers about the Book

Do you have a question about the book? Login to be able to add your own question.

Opinions about Bookdelivery

More customer reviews