Электронная книга: Darril Gibson «CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide»

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide

CISSP Study Guide– fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Издательство: "John Wiley&Sons Limited (USD)"

ISBN: 9781119042723

электронная книга

Купить за 4552.77 руб и скачать на Litres

Другие книги автора:

КнигаОписаниеГодЦенаТип книги
Windows 7 Desktop Support and Administration. Real World Skills for MCITP Certification and Beyond (Exams 70-685 and 70-686)A manual for Windows 7 desktop technicians and administrators It is estimated that 90 percent of the world’s computers run Windows. Desktop technicians and administrators need this comprehensive… — John Wiley&Sons Limited (USD), электронная книга Подробнее...3901.72электронная книга
Mastering Windows 7 DeploymentGet professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7… — John Wiley&Sons Limited (USD), электронная книга Подробнее...3251.32электронная книга
Microsoft Windows Networking EssentialsThe core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to… — John Wiley&Sons Limited (USD), электронная книга Подробнее...2600.93электронная книга
Microsoft Windows Security EssentialsWindows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft… — John Wiley&Sons Limited (USD), электронная книга Подробнее...2600.93электронная книга
Microsoft SQL Server 2008 All-in-One Desk Reference For DummiesIf you’re in charge of database administration, developing database software, or looking for database solutions for your company, Microsoft SQL Server 2008 All-In-One Desk Reference For Dummies can… — John Wiley&Sons Limited (USD), электронная книга Подробнее...3121.25электронная книга

Look at other dictionaries:

  • Certified Information Systems Security Professional — CISSP Logo Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by International Information Systems Security Certification Consortium (ISC)². (ISC)² is a self declared… …   Wikipedia

  • Certified Ethical Hacker — The Certified Ethical Hacker (C|EH) is a professional certification provided by the International Council of E Commerce Consultants (EC Council.) An Ethical Hacker is one name given to a Penetration Tester. An ethical hacker is usually employed… …   Wikipedia