Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick the best of the options given.
The CISSP exam conducted by ISC 2 is the hardest and most rewarded cybersecurity examination. The test has several domains and sub-domains and covers a wide range of topics on security, including cyber and physical building security fields. It also covers breaches, discovery of breaches, and how to report data breaches.
What You Will Learn
Who This Book Is For
Experienced security practitioners, managers, and executives interested in proving their knowledge across a wide array of security practices and principles, including chief information security officers, chief information officers, directors of security, IT directors and managers, security systems engineers, security analysts, security managers, security auditors, security architects, security consultants, private contractors, and network architects
R. Sarma Danturthi, PhD, PMP, CISSP has a doctoral degree in engineering from the University of Memphis, Memphis, TN, USA and has taught graduate-level courses in engineering, microprocessors, and computer science. He has been in the IT field for several years and his earlier experience included designing processor-level boards with interfaces and programming with various languages such as C and C++. His current experience includes design, coding, cyber security, leading project teams, and project management. He has published several papers in peer-reviewed journals, and has written book chapters on software interfaces, modeling, IT security, and simulation. His interests include evolving cyber security, cloud computing, intelligent interfaces, and mobile application development. Besides being proficient in various programming languages, he has certifications in Java, Project Management Institute's PMP, CompTIA Sec+, and ISC 2 CISSP.
Chapter 1. Security and Risk Management.- Chapter 2. Asset Security.- Chapter 3. Security Engineering.- Chapter 4. Communications and Network Security.- Chapter 5. Identity and Access Management.- Chapter 6. Security Assessment and Testing.- Chapter 7. Security Operations.- Chapter 8. Software Development Security.- Chapter 9: Practice Test
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.