28,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
Melden Sie sich
hier
hier
für den Produktalarm an, um über die Verfügbarkeit des Produkts informiert zu werden.
- Broschiertes Buch
"Fully revised for the 2018 CISSP Body of Knowledge"--Cover.
Andere Kunden interessierten sich auch für
- Ben PiperAWS Certified Solutions Architect Study Guide with 900 Practice Test Questions42,99 €
- Dan SullivanGoogle Cloud Certified Associate Cloud Engineer Study Guide45,29 €
- Jeanne Boyarsky (CodeRanch)OCP Oracle Certified Professional Java SE 17 Developer Practice Tests31,99 €
- Aaron KrausThe Official (ISC)2 CCSP CBK Reference59,99 €
- Mike Chapple (University of Notre Dame)CISM Certified Information Security Manager Study Guide51,99 €
- Todd LammleCompTIA Network+ Study Guide40,99 €
- Tresha MorelandPhr/Sphr Professional in Human Resources Certification Practice Exams, Second Edition34,99 €
-
-
-
Produktdetails
- Produktdetails
- Verlag: McGraw-Hill Education
- 5 ed
- Seitenzahl: 464
- Erscheinungstermin: 12. Dezember 2018
- Englisch
- Abmessung: 231mm x 189mm x 26mm
- Gewicht: 706g
- ISBN-13: 9781260142679
- ISBN-10: 1260142671
- Artikelnr.: 52415085
- Verlag: McGraw-Hill Education
- 5 ed
- Seitenzahl: 464
- Erscheinungstermin: 12. Dezember 2018
- Englisch
- Abmessung: 231mm x 189mm x 26mm
- Gewicht: 706g
- ISBN-13: 9781260142679
- ISBN-10: 1260142671
- Artikelnr.: 52415085
Shon Harris, CISSP, was the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Force's Information Warfare unit, an instructor, and an author. She authored several international bestselling books on information security which have sold over a million copies and have been translated into six languages. Jonathan Ham, CISSP, GSEC, GCIA, GCIH, is an independent consultant who specializes in large-scale enterprise security issues. He is a SANS instructor for the MGT414: SANS Training Program for CISSP Certification course.
Chapter 1: Security and Risk Management
Chapter 2: Asset Security
Chapter 3: Security Engineering
Chapter 4: Communication and Network Security
Chapter 5: Identity and Access Management
Chapter 6: Security Assessment and Testing
Chapter 7: Security Operations
Chapter 8: Software Development Security
Chapter 2: Asset Security
Chapter 3: Security Engineering
Chapter 4: Communication and Network Security
Chapter 5: Identity and Access Management
Chapter 6: Security Assessment and Testing
Chapter 7: Security Operations
Chapter 8: Software Development Security
Chapter 1: Security and Risk Management
Chapter 2: Asset Security
Chapter 3: Security Engineering
Chapter 4: Communication and Network Security
Chapter 5: Identity and Access Management
Chapter 6: Security Assessment and Testing
Chapter 7: Security Operations
Chapter 8: Software Development Security
Chapter 2: Asset Security
Chapter 3: Security Engineering
Chapter 4: Communication and Network Security
Chapter 5: Identity and Access Management
Chapter 6: Security Assessment and Testing
Chapter 7: Security Operations
Chapter 8: Software Development Security