Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.
Please read the tutorial at this link. https://ebooknice.com/page/post?id=faq
We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.
For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.
EbookNice Team
Status:
Available4.4
10 reviewsISBN 10: 0071497862
ISBN 13: 9780071497862
Author: Shon Harris, Fernando Maymi Publisher
Fundamental security principles: Availability, Integrity, Confidentiality
Security frameworks (ISO/IEC 27000), controls, laws & regulations
Intellectual property, privacy laws, data breaches
Security policies, standards, risk management lifecycle
Supply chain risk, business continuity, personnel security, ethics
Information lifecycle: acquisition to disposal
Data classification and ownership roles
Retention policies, data remanence, media and mobile device protection
Data leakage and prevention techniques
System and computer architecture basics
Operating system management and architectures
Security models (Bell-LaPadula, Biba, Clark-Wilson, etc.)
Systems evaluation (Common Criteria), certification/accreditation
Cryptography principles, algorithms, attacks, and PKI
Physical security and site design
OSI and TCP/IP models, protocols, transmission media
Wireless networking and security best practices
Network components, routing, VPN, remote access
Network attacks and mitigation
Access control principles, methods, and models
Authentication, authorization, accountability
Identity lifecycle management, federation, cloud integration
Threats to access control, intrusion detection/prevention
Audit strategies: internal, external, third-party
Vulnerability and penetration testing
Log reviews, code testing, security training evaluation
Reporting and management review
Role of operations and personnel in security
Physical and logical access controls
Asset and configuration management, backups, patching
Incident management and computer forensics
Disaster recovery and business continuity planning
Vendor risk, liability, emergency management
Secure coding practices and SDLC phases
Software development methodologies (Waterfall, Agile, DevOps)
Secure environments, configuration management
Web security, database security, malware types
Assessing acquired software security
can i take the cissp exam online
cissp all in one exam guide github
cissp all-in-one exam guide eighth edition
cissp all in one exam guide shon harris
mcgraw hill cissp all in one exam guide
Tags: Shon Harris, Fernando Maymi Publisher, CISSP