logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

일간
|
주간
|
월간

실시간 검색어

검색가능 서점

도서목록 제공

Official

Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2 ed)

Harold F. Tipton (엮은이)
Auerbach Pub
173,670원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
142,400원 -18% 0원
7,120원
135,280원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Official
eBook 미리보기

책 정보

· 제목 : Official (ISC)2 Guide to the SSCP CBK (Hardcover, 2 ed) 
· 분류 : 외국도서 > 컴퓨터 > 네트워킹 > 일반
· ISBN : 9781439804834
· 쪽수 : 468쪽
· 출판일 : 2010-12-08

목차

Access Controls; Paul Henry
Access Control Concepts
Architecture Models
Identification, Authentication, Authorization, and Accountability
Remote Access Methods
Other Access Control Areas
Sample Questions

Cryptography; Christopher M. Nowell
The Basics
Symmetric Cryptography
General Cryptography
Specific Hashes
Specific Protocols
X.509
Sample Questions

Malicious Code; Ken Dunham
Introduction to Windows Malcode Security Management
Malcode Naming Conventions and Types
Brief History of Malcode
Vectors of Infection
Payloads
Identifying Infections
Behavioral Analysis of Malcode
Malcode Mitigation
Sample Questions

Monitoring and Analysis; Mike Mackrill
Policy, Controls, and Enforcement
Audit
Monitoring
Sample Questions

Networks and Telecommunications; Eric Waxvik and Samuel Chun
Introduction to Networks and Telecommunications
Network Protocols and Security Characteristics
Data Communications and Network Infrastructure Components and Security Characteristics
Wireless Local Area Networking
Sample Questions

Security Operations and Administration; C. Karen Stopford
Security Program Objectives: The C-I-A Triad
Code of Ethics
Security Best Practices
Designing a Security Architecture
Security Program Frameworks
Aligning Business, IT, and Security
Security Architecture and Models
Access Control Models
Identity and Access Management
Managing Privileged User Accounts
Outsourcing Security and Managed Security Service Providers
Business Partner Security Controls
Security Policies, Standards, Guidelines, and Procedures
Considerations for Safeguarding Confidentiality
Privacy and Monitoring
Information Life Cycle
Protecting Confidentiality and Information Classification
Information Handling Policy
Information Collection
Secure Information Storage
Secure Output
Record Retention and Disposal
Disclosure Controls: Data Leakage Prevention
Secure Application Development
Web Application Vulnerabilities and Secure Development Practices
Implementation and Release Management
Systems Assurance and Controls Validation
Certification and Accreditation
Security Assurance Rating: Common Criteria
Change Control
Configuration Management
Patch Management
Monitoring System Integrity
Endpoint Protection
Thin Client Implementations
Metrics
Security Awareness and Training
Review Questions
References

Risk, Response, and Recovery; Chris Trautwein
Introduction to Risk Management
Incident Response
Forensics
Recovery

Appendix: Questions and Answers
Access Controls
Cryptography
Malicious Code
Monitoring and Analysis
Networks and Telecommunications
Risk, Response, and Recovery
Security Operations and Administration

Index

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책