menu
{ "item_title" : "CISSP Exam Study Guide For Security Professionals", "item_author" : [" Richie Miller "], "item_description" : "If you want to become a Cybersecurity Professional, this book is for youBUY THIS BOOK NOW AND GET STARTED TODAYIn this book you will discover:Baseline Configuration, Diagrams & IP ManagementData Sovereignty & Data Loss PreventionData Masking, Tokenization & Digital Rights ManagementGeographical Considerations & Cloud Access Security BrokerSecure Protocols, SSL Inspection & HashingAPI Gateways & Recovery SitesHoneypots, Fake Telemetry & DNS SinkholeCloud Storage and Cloud ComputingIaaS, PaaS & SaaSManaged Service Providers, Fog Computing & Edge ComputingVDI, Virtualization & ContainersMicroservices and APIsInfrastructure as Code (IAC) & Software Defined Networking (SDN)Service Integrations and Resource PoliciesEnvironments, Provisioning & DeprovisioningIntegrity Measurement & Code AnalysisSecurity Automation, Monitoring & ValidationSoftware Diversity, Elasticity & ScalabilityDirectory Services, Federation & AttestationTime-Based Passwords, Authentication & TokensProximity Cards, Biometric & Facial RecognitionVein and Gait Analysis & Efficacy RatesGeographically Disperse, RAID & MultipathLoad Balancer, Power Resiliency & ReplicationBackup Execution PoliciesHigh Availability, Redundancy & Fault ToleranceEmbedded Systems & SCADA SecuritySmart Devices / IoT & Special Purpose DevicesHVAC, Aircraft/UAV & MFDsReal Time Operating Systems & Surveillance SystemsBarricades, Mantraps & AlarmsCameras, Video Surveillance & GuardsCable Locks, USB Data Blockers, Safes & FencingMotion Detection / Infrared & Proximity ReadersDemilitarized Zone & Protected Distribution SystemShredding, Pulping & PulverizingDeguassing, Purging & WipingCryptographic Terminology and HistoryDigital Signatures, Key Stretching & HashingQuantum Communications & Elliptic Curve CryptographyQuantum Computing, Cipher Modes & XOR FunctionEncryptions & BlockchainsAsymmetric/Lightweight Encryption & SteganographyCipher Suites, Random & Quantum Random Number GeneratorsSecure Networking ProtocolsHost or Application Security SolutionsCoding, Fuzzing & Quality TestingHow to Implement Secure Network DesignsNetwork Access Control, Port Security & Loop ProtectionSpanning Tree, DHCP Snooping & MAC FilteringAccess Control Lists & Route SecurityIntrusion Detection and PreventionFirewalls & Unified Threat ManagementHow to Install and Configure Wireless SecurityHow to Implement Public Key InfrastructureData Sources to Support an IncidentHow to Assess Organizational SecurityDetection and AnalysisTest Scenarios & SimulationsThreat Intelligence LifecycleMobile Device ManagementDLP, Content Filters & URL FiltersKey Aspects of Digital ForensicsQualitative and Quantitative AnalysisBusiness Impact AnalysisIdentification of Critical SystemsOrder of RestorationContinuity of OperationsPrivacy and Sensitive Data ConceptsIncident Notification and EscalationData ClassificationPrivacy-enhancing TechnologiesData Owners & ResponsibilitiesInformation LifecycleBUY THIS BOOK NOW AND GET STARTED TODAY", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/1/83/938/184/1839381841_b.jpg", "price_data" : { "retail_price" : "39.99", "online_price" : "39.99", "our_price" : "39.99", "club_price" : "39.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
CISSP Exam Study Guide For Security Professionals|Richie Miller

CISSP Exam Study Guide For Security Professionals : NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

If you want to become a Cybersecurity Professional, this book is for you

BUY THIS BOOK NOW AND GET STARTED TODAY

In this book you will discover:

Baseline Configuration, Diagrams & IP Management

Data Sovereignty & Data Loss Prevention

Data Masking, Tokenization & Digital Rights Management

Geographical Considerations & Cloud Access Security Broker

Secure Protocols, SSL Inspection & Hashing

API Gateways & Recovery Sites

Honeypots, Fake Telemetry & DNS Sinkhole

Cloud Storage and Cloud Computing

IaaS, PaaS & SaaS

Managed Service Providers, Fog Computing & Edge Computing

VDI, Virtualization & Containers

Microservices and APIs

Infrastructure as Code (IAC) & Software Defined Networking (SDN)

Service Integrations and Resource Policies

Environments, Provisioning & Deprovisioning

Integrity Measurement & Code Analysis

Security Automation, Monitoring & Validation

Software Diversity, Elasticity & Scalability

Directory Services, Federation & Attestation

Time-Based Passwords, Authentication & Tokens

Proximity Cards, Biometric & Facial Recognition

Vein and Gait Analysis & Efficacy Rates

Geographically Disperse, RAID & Multipath

Load Balancer, Power Resiliency & Replication

Backup Execution Policies

High Availability, Redundancy & Fault Tolerance

Embedded Systems & SCADA Security

Smart Devices / IoT & Special Purpose Devices

HVAC, Aircraft/UAV & MFDs

Real Time Operating Systems & Surveillance Systems

Barricades, Mantraps & Alarms

Cameras, Video Surveillance & Guards

Cable Locks, USB Data Blockers, Safes & Fencing

Motion Detection / Infrared & Proximity Readers

Demilitarized Zone & Protected Distribution System

Shredding, Pulping & Pulverizing

Deguassing, Purging & Wiping

Cryptographic Terminology and History

Digital Signatures, Key Stretching & Hashing

Quantum Communications & Elliptic Curve Cryptography

Quantum Computing, Cipher Modes & XOR Function

Encryptions & Blockchains

Asymmetric/Lightweight Encryption & Steganography

Cipher Suites, Random & Quantum Random Number Generators

Secure Networking Protocols

Host or Application Security Solutions

Coding, Fuzzing & Quality Testing

How to Implement Secure Network Designs

Network Access Control, Port Security & Loop Protection

Spanning Tree, DHCP Snooping & MAC Filtering

Access Control Lists & Route Security

Intrusion Detection and Prevention

Firewalls & Unified Threat Management

How to Install and Configure Wireless Security

How to Implement Public Key Infrastructure

Data Sources to Support an Incident

How to Assess Organizational Security

Detection and Analysis

Test Scenarios & Simulations

Threat Intelligence Lifecycle

Mobile Device Management

DLP, Content Filters & URL Filters

Key Aspects of Digital Forensics

Qualitative and Quantitative Analysis

Business Impact Analysis

Identification of Critical Systems

Order of Restoration

Continuity of Operations

Privacy and Sensitive Data Concepts

Incident Notification and Escalation

Data Classification

Privacy-enhancing Technologies

Data Owners & Responsibilities

Information Lifecycle


BUY THIS BOOK NOW AND GET STARTED TODAY

This item is Non-Returnable

Details

  • ISBN-13: 9781839381843
  • ISBN-10: 1839381841
  • Publisher: Pastor Publishing Ltd
  • Publish Date: January 2023
  • Dimensions: 9 x 6 x 1.4 inches
  • Shipping Weight: 2.03 pounds
  • Page Count: 702

Related Categories

You May Also Like...

    1

BAM Customer Reviews