ODBIERZ TWÓJ BONUS :: »

    Certified Information Systems Security Professional (CISSP) Exam Guide. Become a certified CISSP professional with practical exam-oriented knowledge of all eight domains

    (ebook) (audiobook) (audiobook) Język publikacji: angielski
    Certified Information Systems Security Professional (CISSP) Exam Guide. Become a certified CISSP professional with practical exam-oriented knowledge of all eight domains Ted Jordan, Ric Daza, Hinne Hettema - okładka ebooka

    Certified Information Systems Security Professional (CISSP) Exam Guide. Become a certified CISSP professional with practical exam-oriented knowledge of all eight domains Ted Jordan, Ric Daza, Hinne Hettema - okładka ebooka

    Certified Information Systems Security Professional (CISSP) Exam Guide. Become a certified CISSP professional with practical exam-oriented knowledge of all eight domains Ted Jordan, Ric Daza, Hinne Hettema - okładka audiobooka MP3

    Certified Information Systems Security Professional (CISSP) Exam Guide. Become a certified CISSP professional with practical exam-oriented knowledge of all eight domains Ted Jordan, Ric Daza, Hinne Hettema - okładka audiobooks CD

    Ocena:
    Bądź pierwszym, który oceni tę książkę
    Stron:
    534
    (ISC)2 CISSP tests for the competencies necessary to secure organizations, corporations, military sites, and government firms. The CISSP certification guide offers complete, up-to-date coverage of the latest CISSP exam syllabus so that you can sit the exam with confidence, fully equipped to crack it.
    The book offers self-assessment questions, interactive flashcards, and invaluable exam tips covering all eight domains required by the CISSP exam, including detailed answers and explanations for all questions to help you better gauge your current skill level and beef up any weak areas.
    It contains all the information needed to pass the CISSP exam and obtain your certification. You start with the big picture of what it takes to secure the organization through asset and risk management.  Next, you break down the details of securing networks, and identities. Finally, later chapters cover critical aspects of vendor security, physical security, and software security.
    By the end of this book, you'll have covered everything you need to pass the latest CISSP certification exam and have a useful desktop security reference tool.

    Wybrane bestsellery

    O autorach ebooka

    Ted Jordan, MSc, CISSP has more than 25 years of UNIX, IRIX, Solaris, and Linux experience. He learned C language and UNIX administration while completing his Masters at UC Berkeley, and started his career at General Motors as an undergraduate of Kettering University in Flint, MI. He also did engineering with Silicon Graphics, The CAVE Virtual Reality, and SUN Microsystems. He trains and holds the CISSP, LPIC-1, Linux+, SUSE Linux Administrator, Network+, A+, Security+, Solaris Administrator, and Certified Ethical Hacker certifications. He is Founder and President of two successful tech startup companies including Funutation Tekademy Inc which teaches kids to program robots and write video games through their franchise operators. Ted lives with his family near Milwaukee, WI and enjoys tennis, golf, and karaoke.
    Ric Daza, with 27 years of experience in solving information technology problems, is a security and risk management expert who has consulted for government agencies and Fortune 500 companies in various sectors, including financial, technology, defense, healthcare, national sports franchises, and manufacturing. As an interim CISO and executive consultant, Ric specializes in an evidence-based approach to tackling process and technology challenges, including networking, risk management, security analysis, incident response, risk communication, vulnerability management, and more.
    Ric holds multiple certifications, including double CCIE² (R&S, Security), CISSP, CRISC, CISA, ISO 27001 Lead Auditor, PMP, and RHCE.
    Hinne Hettema is a practitioner in cybersecurity operations, focusing especially on enabling security capabilities through detection engineering, security monitoring, threat intelligence, incident response, operational technology, and malware research. He works in New Zealand in security operations and the establishment of cybersecurity defensive capabilities in various organizations. He is an adjunct senior fellow at the University of Queensland, researching cybersecurity operations, the security of operational technology, and the philosophy of cybersecurity. He studied theoretical chemistry and philosophy.

    Zamknij

    Wybierz metodę płatności

    Zamknij Pobierz aplikację mobilną Ebookpoint