Official (ISC)2 guide to the CISSP CBK. (2014)
- Record Type:
- Book
- Title:
- Official (ISC)2 guide to the CISSP CBK. (2014)
- Main Title:
- Official (ISC)2 guide to the CISSP CBK
- Further Information:
- Note: Edited by Adam Gordon.
- Editors:
- Gordon, Adam
- Contents:
- Domain 1 — Security & Risk Management; Security & Risk Management; Confidentiality, Integrity, and Availability; Security Governance; The Complete and Effective Security Program; Compliance; Global Legal and Regulatory Issues; Understand Professional Ethics; Develop and Implement Security Policy; Business Continuity (BC) & Disaster Recovery (DR) Requirements; Manage Personnel Security; Risk Management Concepts; Threat Modeling; Acquisitions Strategy and Practice; Security Education, Training, and Awareness Domain 2 — Asset Security; Asset Security; Data Management: Determine and Maintain Ownership; Data Standards; Longevity and Use; Classify Information and Supporting Assets; Asset Management; Protect Privacy; Ensure Appropriate Retention; Determine Data Security Controls; Standards Selection Domain 3 — Security Engineering; Security Engineering; The Engineering Lifecycle Using Security Design Principles; Fundamental Concepts of Security Models; Information Systems Security Evaluation Models; Security Capabilities of Information Systems; Vulnerabilities of Security Architectures; Database Security; Software and System Vulnerabilities and Threats; Vulnerabilities in Mobile Systems; Vulnerabilities in Embedded Devices and Cyber-Physical Systems; The Application and Use of Cryptography; Site and Facility Design Considerations; Site Planning; Implementation and Operation of Facilities Security Domain 4 — Communications & Network Security; Communications & Network Security;Domain 1 — Security & Risk Management; Security & Risk Management; Confidentiality, Integrity, and Availability; Security Governance; The Complete and Effective Security Program; Compliance; Global Legal and Regulatory Issues; Understand Professional Ethics; Develop and Implement Security Policy; Business Continuity (BC) & Disaster Recovery (DR) Requirements; Manage Personnel Security; Risk Management Concepts; Threat Modeling; Acquisitions Strategy and Practice; Security Education, Training, and Awareness Domain 2 — Asset Security; Asset Security; Data Management: Determine and Maintain Ownership; Data Standards; Longevity and Use; Classify Information and Supporting Assets; Asset Management; Protect Privacy; Ensure Appropriate Retention; Determine Data Security Controls; Standards Selection Domain 3 — Security Engineering; Security Engineering; The Engineering Lifecycle Using Security Design Principles; Fundamental Concepts of Security Models; Information Systems Security Evaluation Models; Security Capabilities of Information Systems; Vulnerabilities of Security Architectures; Database Security; Software and System Vulnerabilities and Threats; Vulnerabilities in Mobile Systems; Vulnerabilities in Embedded Devices and Cyber-Physical Systems; The Application and Use of Cryptography; Site and Facility Design Considerations; Site Planning; Implementation and Operation of Facilities Security Domain 4 — Communications & Network Security; Communications & Network Security; Secure Network Architecture and Design; Implications of Multi-Layer Protocols; Converged Protocols; Securing Network Components; Secure Communication Channels; Network Attacks Domain 5 — Identity & Access Management; Identity & Access Management; Physical and Logical Access to Assets; Identification and Authentication of People and Devices; Identity Management Implementation; Identity as a Service (IDaaS); Integrate Third-Party Identity Services; Implement and Manage Authorization Mechanisms; Prevent or Mitigate Access Control Attacks; Identity and Access Provisioning Lifecycle Domain 6 — Security Assessment & Testing; Security Assessment & Testing; Assessment and Test Strategies; Collect Security Process Data; Internal and Third-Party Audits Domain 7 — Security Operations; Security Operations; Investigations; Provisioning of Resources through Configuration Management; Resource Protection; Incident Response; Preventative Measures against Attacks; Patch and Vulnerability Management; Change and Configuration Management; The Disaster Recovery Process; Test Plan Review; Business Continuity and Other Risk Areas; Access Control; Personnel Safety Domain 8 — Security in the Software Development Life Cycle; Security in the Software Development Life Cycle; Software Development Security Outline; Environment and Security Controls; Security of the Software Environment; Software Protection Mechanisms; Assess the Effectiveness of Software Security; Assess Software Acquisition Security; … (more)
- Edition:
- Fourth edition
- Publisher Details:
- Boca Raton : Auerbach
- Publication Date:
- 2014
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer networks -- Security measures -- Examinations -- Study guides
Computer security -- Examinations -- Study guides
Electronic data processing personnel -- Certification - Languages:
- English
- ISBNs:
- 9781482262766
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.141176
- Ingest File:
- 02_032.xml