Cissp certified information systems security professional : the official (isc)2 cissp cbk reference / / John Warsinske
| Cissp certified information systems security professional : the official (isc)2 cissp cbk reference / / John Warsinske |
| Autore | Warsinske John |
| Edizione | [Fifth edition.] |
| Pubbl/distr/stampa | Danvers : , : Wiley, , 2019 |
| Descrizione fisica | 1 online resource (xxx, 898 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer networks - Security measures - Examinations
Telecommunications engineers - Certification |
| Soggetto non controllato |
Computer Networks
Computers Administrative Agencies Political Science |
| ISBN |
1-119-42330-9
1-119-42332-5 1-119-42331-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Intro; CISSP The Official (ISC)2® CISSP® CBK® Reference; Lead Author and Lead Technical Reviewer; Contributing Authors; Technical Reviewers; Contents at a Glance; Contents; Foreword; Introduction; Security and Risk Management; Asset Security; Security Architecture and Engineering; Communication and Network Security; Identity and Access Management (IAM); Security Assessment and Testing; Security Operations; Software Development Security; Domain 1: Security and Risk Management; Understand and Apply Concepts of Confidentiality, Integrity, and Availability; Information Security Evaluate and Apply Security Governance PrinciplesAlignment of Security Functions to Business Strategy, Goals, Mission, and Objectives; Vision, Mission, and Strategy; Governance; Due Care; Determine Compliance Requirements; Legal Compliance; Jurisdiction; Legal Tradition; Legal Compliance Expectations; Understand Legal and Regulatory Issues That Pertain to Information Security in a Global Context; Cyber Crimes and Data Breaches; Privacy; Understand, Adhere to, and Promote Professional Ethics; Ethical Decision-Making; Established Standards of Ethical Conduct; (ISC)² Ethical Practices Develop, Document, and Implement Security Policy, Standards, Procedures, and GuidelinesOrganizational Documents; Policy Development; Policy Review Process; Identify, Analyze, and Prioritize Business Continuity Requirements; Develop and Document Scope and Plan; Risk Assessment; Business Impact Analysis; Develop the Business Continuity Plan; Contribute to and Enforce Personnel Security Policies and Procedures; Key Control Principles; Candidate Screening and Hiring; Onboarding and Termination Processes; Vendor, Consultant, and Contractor Agreements and Controls; Privacy in the Workplace Understand and Apply Risk Management ConceptsRisk; Risk Management Frameworks; Risk Assessment Methodologies; Understand and Apply Threat Modeling Concepts and Methodologies; Threat Modeling Concepts; Threat Modeling Methodologies; Apply Risk-Based Management Concepts to the Supply Chain; Supply Chain Risks; Supply Chain Risk Management; Establish and Maintain a Security Awareness, Education, and Training Program; Security Awareness Overview; Developing an Awareness Program; Training; Summary; Domain 2: Asset Security; Asset Security Concepts; Data Policy; Data Governance; Data Quality Data DocumentationData Organization; Identify and Classify Information and Assets; Asset Classification; Determine and Maintain Information and Asset Ownership; Asset Management Lifecycle; Software Asset Management; Protect Privacy; Cross-Border Privacy and Data Flow Protection; Data Owners; Data Controllers; Data Processors; Data Stewards; Data Custodians; Data Remanence; Data Sovereignty; Data Localization or Residency; Government and Law Enforcement Access to Data; Collection Limitation; Understanding Data States; Data Issues with Emerging Technologies; Ensure Appropriate Asset Retention. |
| Record Nr. | UNINA-9910830400503321 |
Warsinske John
|
||
| Danvers : , : Wiley, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Wireshark for security professionals : using wireshark and the metasploit framework / / Jessey Bullock, Jeff T. Parker
| Wireshark for security professionals : using wireshark and the metasploit framework / / Jessey Bullock, Jeff T. Parker |
| Autore | Bullock Jessey |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2017 |
| Descrizione fisica | 1 online resource (291 pages) |
| Disciplina | 005.8 |
| Collana | THEi Wiley ebooks. |
| Soggetto topico | Computer security |
| ISBN |
1-118-91822-3
1-119-18345-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introducing Wireshark -- Setting Up the Lab -- The Fundamentals -- Capturing Packets -- Diagnosing Attacks -- Offensive Wireshark -- Decrypting TLS, Capturing USB, Keyloggers, and Network Graphing -- Scripting with Lua. |
| Record Nr. | UNINA-9910271028803321 |
Bullock Jessey
|
||
| Indianapolis, Indiana : , : Wiley, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Wireshark for security professionals : using wireshark and the metasploit framework / / Jessey Bullock, Jeff T. Parker
| Wireshark for security professionals : using wireshark and the metasploit framework / / Jessey Bullock, Jeff T. Parker |
| Autore | Bullock Jessey |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2017 |
| Descrizione fisica | 1 online resource (291 pages) |
| Disciplina | 005.8 |
| Collana | THEi Wiley ebooks. |
| Soggetto topico | Computer security |
| ISBN |
1-118-91822-3
1-119-18345-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introducing Wireshark -- Setting Up the Lab -- The Fundamentals -- Capturing Packets -- Diagnosing Attacks -- Offensive Wireshark -- Decrypting TLS, Capturing USB, Keyloggers, and Network Graphing -- Scripting with Lua. |
| Record Nr. | UNINA-9910811416903321 |
Bullock Jessey
|
||
| Indianapolis, Indiana : , : Wiley, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||