MARC details
000 -LEADER |
fixed length control field |
02491nam a2200253Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520102922.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119475934 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76.3 .C43 2018 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Chapple, Mike |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
(ISC)2 CISSP Certified Information Systems Security Professional : |
Remainder of title |
official study guide / |
Statement of responsibility, etc. |
Mike Chapple, James Michael Stewart and Darril Gibson |
250 ## - EDITION STATEMENT |
Edition statement |
Eight edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Indianapolis, Indiana : |
Name of publisher, distributor, etc. |
John Wiley & Son, Inc., |
Date of publication, distribution, etc. |
c2018 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 1050 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price amount |
USD37.45 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 1 Security governance through principles and policies -- Chapter 2 Personnel security and risk management concepts -- Chapter 3 Business continuity planning -- Chapter 4 Laws, regulations, and compliance -- Chapter 5 Protecting security of assets -- Chapter 6 Cryptography and symmetric key algorithms -- Chapter 7 PKI and cryptographic applications -- Chapter 8 Principles of security models, design and capabilities -- Chapter 9 Security vulnerabilities, threats, and countermeasures -- Chapter 10 Physical security requirements -- Chapter 11 Secure network architecture and securing network components -- Chapter 12 Secure communications and network attacks -- Chapter 13 Managing identity and authentication -- Chapter 14 Controlling and monitoring access -- Chapter 15 Security assessment and testing -- Chapter 16 Managing security operations -- Chapter 17 Preventing and responding to incidents -- Chapter 18 Disaster recovery planning -- Chapter 19 Investigations and ethics -- Chapter 20 Software development security -- Chapter 21 Malicious code and application attacks. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER SECURITY -- EXAMINATIONS |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Stewart, James Michael;Gibson, Darril |
Relator term |
co-author;co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books - Reference |