Comenzó HOT SALE Hasta 50% en importados + ENVIO GRATIS en todos los pedidos!  Ver más

menú

0
  • argentina
  • chile
  • colombia
  • españa
  • méxico
  • perú
  • estados unidos
  • internacional
portada CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance (en Inglés)
Formato
Libro Físico
Idioma
Inglés
N° páginas
702
Encuadernación
Tapa Blanda
Dimensiones
22.9 x 15.2 x 3.6 cm
Peso
0.92 kg.
ISBN13
9781839381843

CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance (en Inglés)

Richie Miller (Autor) · Pastor Publishing Ltd · Tapa Blanda

CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance (en Inglés) - Miller, Richie

Libro Físico

$ 47.040

$ 94.080

Ahorras: $ 47.040

50% descuento
  • Estado: Nuevo
Origen: Estados Unidos (Costos de importación incluídos en el precio)
Se enviará desde nuestra bodega entre el Jueves 06 de Junio y el Jueves 20 de Junio.
Lo recibirás en cualquier lugar de Argentina entre 1 y 3 días hábiles luego del envío.

Reseña del libro "CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance (en Inglés)"

If you want to become a Cybersecurity Professional, this book is for you! BUY THIS BOOK NOW AND GET STARTED TODAY! In this book you will discover: Baseline Configuration, Diagrams & IP ManagementData Sovereignty & Data Loss PreventionData Masking, Tokenization & Digital Rights ManagementGeographical Considerations & Cloud Access Security BrokerSecure Protocols, SSL Inspection & HashingAPI Gateways & Recovery SitesHoneypots, Fake Telemetry & DNS SinkholeCloud Storage and Cloud ComputingIaaS, PaaS & SaaSManaged Service Providers, Fog Computing & Edge ComputingVDI, Virtualization & ContainersMicroservices and APIsInfrastructure as Code (IAC) & Software Defined Networking (SDN)Service Integrations and Resource PoliciesEnvironments, Provisioning & DeprovisioningIntegrity Measurement & Code AnalysisSecurity Automation, Monitoring & ValidationSoftware Diversity, Elasticity & ScalabilityDirectory Services, Federation & AttestationTime-Based Passwords, Authentication & TokensProximity Cards, Biometric & Facial RecognitionVein and Gait Analysis & Efficacy RatesGeographically Disperse, RAID & MultipathLoad Balancer, Power Resiliency & ReplicationBackup Execution PoliciesHigh Availability, Redundancy & Fault ToleranceEmbedded Systems & SCADA SecuritySmart Devices / IoT & Special Purpose DevicesHVAC, Aircraft/UAV & MFDsReal Time Operating Systems & Surveillance SystemsBarricades, Mantraps & AlarmsCameras, Video Surveillance & GuardsCable Locks, USB Data Blockers, Safes & FencingMotion Detection / Infrared & Proximity ReadersDemilitarized Zone & Protected Distribution SystemShredding, Pulping & PulverizingDeguassing, Purging & WipingCryptographic Terminology and HistoryDigital Signatures, Key Stretching & HashingQuantum Communications & Elliptic Curve CryptographyQuantum Computing, Cipher Modes & XOR FunctionEncryptions & BlockchainsAsymmetric/Lightweight Encryption & SteganographyCipher Suites, Random & Quantum Random Number GeneratorsSecure Networking ProtocolsHost or Application Security SolutionsCoding, Fuzzing & Quality TestingHow to Implement Secure Network DesignsNetwork Access Control, Port Security & Loop ProtectionSpanning Tree, DHCP Snooping & MAC FilteringAccess Control Lists & Route SecurityIntrusion Detection and PreventionFirewalls & Unified Threat ManagementHow to Install and Configure Wireless SecurityHow to Implement Public Key InfrastructureData Sources to Support an IncidentHow to Assess Organizational SecurityDetection and AnalysisTest Scenarios & SimulationsThreat Intelligence LifecycleMobile Device ManagementDLP, Content Filters & URL FiltersKey Aspects of Digital ForensicsQualitative and Quantitative AnalysisBusiness Impact AnalysisIdentification of Critical SystemsOrder of RestorationContinuity of OperationsPrivacy and Sensitive Data ConceptsIncident Notification and EscalationData ClassificationPrivacy-enhancing TechnologiesData Owners & ResponsibilitiesInformation LifecycleBUY THIS BOOK NOW AND GET STARTED TODAY!

Opiniones del libro

Ver más opiniones de clientes
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)
  • 0% (0)

Preguntas frecuentes sobre el libro

Todos los libros de nuestro catálogo son Originales.
El libro está escrito en Inglés.
La encuadernación de esta edición es Tapa Blanda.

Preguntas y respuestas sobre el libro

¿Tienes una pregunta sobre el libro? Inicia sesión para poder agregar tu propia pregunta.

Opiniones sobre Buscalibre

Ver más opiniones de clientes