CISSP guide to security essentials
Material type: TextPublisher: Australia : Cengage Learning, [2015]Copyright date: �2015Edition: Second editionDescription: xxxvi, 501 pages : illustrations ; 23 cmISBN:- 9781285060422
- 1285060423
- 005.8 GRE
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | Botho University Botswana Open Shelves | Engineering | 005.8 GRE (Browse shelf(Opens below)) | Available | BU-LIB23295 | ||
Books | Botho University Botswana Open Shelves | Engineering | 005.8 GRE (Browse shelf(Opens below)) | Available | BU-LIB23294 | ||
Books | Botho University eSwatini Open Shelves | Information Technology | 005.8 GRE (Browse shelf(Opens below)) | Available | BU-LIB23296 | ||
Books | Botho University eSwatini Open Shelves | Information Technology | 005.8 GRE (Browse shelf(Opens below)) | Available | BU-LIB23297 |
Browsing Botho University eSwatini shelves, Shelving location: Open Shelves, Collection: Information Technology Close shelf browser (Hides shelf browser)
005.8 FAD Network security : a hacker's perspective | 005.8 FRE Programming .NET security | 005.8 GIB CompTIA Security+ : get certified get ahead SYO-401 study guide | 005.8 GRE CISSP guide to security essentials | 005.8 GRE CISSP guide to security essentials | 005.8 HAR Network security a practical approach | 005.8 HAR Network security a practical approach |
CISSP GUIDE TO SECURITY ESSENTIALS, Second Edition, provides complete, focused coverage to prepare students and professionals alike for success on the Certified Information Systems Security Professional (CISSP) certification exam. The text opens with an overview of the current state of information security, including relevant legislation and standards, before proceeding to explore all ten CISSP domains in great detail, from security architecture and design to access control and cryptography. Each chapter opens with a brief review of relevant theory and concepts, followed by a strong focus on real-world applications and learning tools designed for effective exam preparation, including key terms, chapter summaries, study questions, hands-on exercises, and case projects. Developed by the author of more than 30 books on information securitythe Second Edition of this trusted text has been updated to reflect important new developments in technology and industry practices, providing an accurate guide to the entire CISSP common body of knowledge.
There are no comments on this title.