- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Save 12% on This CISSP Boxed Set-Plus Bonus DVD! This money-saving CISSP boxed set from the #1 name in IT security certification and training includes: CISSP All-in-One Exam Guide, Sixth Edition Up-to-date coverage of all 10 CISSP exam domains Electronic content-1400+ practice exam questions, video training module, and a downloadable Adobe Digital Editions eBook CISSP Practice Exams, Second Edition 250+ practice exam questions covering all 10 CISSP exam domains Realistic questions with detailed answer explanations Electronic content-audio lectures and additional practice questions Bonus DVD with three hours of audio and video training featuring Shon Harris: One hour of audio training reviewing key access control concepts Two hours of video training teaching core cryptography concepts Complete CISSP coverage: Information Security Governance and Risk Management; Access Control; Security Architecture and Design; Physical (Environmental) Security; Telecommunications and Networking Security; Cryptography; Business Continuity and Disaster Recovery Planning; Legal, Regulations, Investigations, and Compliance; Software Development Security; Operations Security
Contents
CISSP All-in-One Exam Guide Chapter 1Information Security and Risk Management Chapter 3: Access Control Chapter 4: Security Architecture and Design Chapter 5: Physical (Environmental) Security Chapter 6: Telecommunications and Network Security Chapter 7: Cryptography Chapter 8: Business Continuity & Disaster Recovery Planning Chapter 9: Legal, Regulations, Compliance, and Investigations Chapter 10: Software Development Security Chapter 11: Security Operations CISSP Practice Exams Chapter 1: Information Security and Risk Management Chapter 2: Access Control Chapter 3: Security Architecture and Design Chapter 4: Physical and Environmental Security Chapter 5: Telecommunications and Network Security Chapter 6: Cryptography Chapter 7: Business Continuity and Disaster Recovery Chapter 8: Legal, Regulations, Compliance, and Investigations Chapter 9: Application Security Chapter 10: Operations Security