Descriere YEO:
Official (ISC)2 Guide to the - Disponibil la libris.ro
Pe YEO găsești Official (ISC)2 Guide to the de la John Warsinske, în categoria Computers.
Indiferent de nevoile tale, Official (ISC)2 Guide to the CISSP CBK Reference din categoria Computers îți poate aduce un echilibru perfect între calitate și preț, cu avantaje practice și moderne.
Preț: 488.7 Lei
Caracteristicile produsului Official (ISC)2 Guide to the
- Brand: John Warsinske
- Categoria: Computers
- Magazin: libris.ro
- Ultima actualizare: 25-10-2024 01:12:27
Comandă Official (ISC)2 Guide to the Online, Simplu și Rapid
Prin intermediul platformei YEO, poți comanda Official (ISC)2 Guide to the de la libris.ro rapid și în siguranță. Bucură-te de o experiență de cumpărături online optimizată și descoperă cele mai bune oferte actualizate constant.
Descriere magazin:
The only official, comprehensive reference guide to the
CISSP All new for 2019 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the
CISSP credential?meets the stringent requirements of ISO/IEC Standard 17024. This CBK covers the new eight domains of
CISSP with the necessary depth to apply them to the daily practice of information security. Written by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with: Common and good practices for each objective Common vocabulary and definitions References to widely accepted computing standards Highlights of successful approaches through case studies Whether youve earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.