buchspektrum Internet-Buchhandlung

Neuerscheinungen 2016

Stand: 2020-02-01
Schnellsuche
ISBN/Stichwort/Autor
Herderstraße 10
10625 Berlin
Tel.: 030 315 714 16
Fax 030 315 714 14
info@buchspektrum.de

Shon Harris, Fernando Maymi (Beteiligte)

CISSP All-in-One Exam Guide, w. CD-ROM


7th ed. 2016. 1456 p. 233 mm
Verlag/Jahr: MCGRAW-HILL PROFESSIONAL 2016
ISBN: 0-07-184927-0 (0071849270)
Neue ISBN: 978-0-07-184927-2 (9780071849272)

Preis und Lieferzeit: Bitte klicken


Revised and updated for the 2015 CISSP body of knowledge, this new edition by Fernando Maymi continues Shon Harris´s bestselling legacy, adding new performance-based questions and providing a complete overhaul of the content that has made Harris the #1 name in IT security certification.
A fully revised edition of the #1 CISSP training resource
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all exam domains, as well as the new 2015 CISSP Common Body of Knowledge developed by the International Information Systems Security Certification Consortium (ISC) 2© . CISSP All-in-One Exam Guide, Seventh Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Written by leading experts in IT security certification and training, this completely up-to-date self-study system helps you pass the exam with ease and also serves as an essential on-the-job reference.
Covers all 8 CISSP domains:
Security and risk management Asset security Security engineering Communication and network security Identity and access management Security assessment and testing Security operations Software development security CD ICON
Electronic content includes:
1400+ practice questions
Introduction
Chapter 1 Security and Risk Management
Chapter 2 Asset Security
Chapter 3 Security Engineering
Chapter 4 Communication and Network Security
Chapter 5 Identity and Access Management
Chapter 6 Security Assessment and Testing
Chapter 7 Security Operations
Chapter 8 Software Development Security