Search Books
Fundamentals of Grid Comput… ARM Assembly Language: Fund…

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Publisher Auerbach Publications
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
57.76 83.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $38.05

✓ Usually ships in 24 hours

Share:
Book Details
ISBN / ASIN1439804834
ISBN-139781439804834
AvailabilityUsually ships in 24 hours
Sales Rank1,090,469
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

The (ISC)²® Systems Security Certified Practitioner (SSCP®) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK®has quickly become the book that many of today’s security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)²CBK.

Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text:

  • Presents widely recognized best practices and techniques used by the world's most experienced administrators
  • Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding
  • Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)² certification

Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.

The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View