دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 6
نویسندگان: MIKE WILLS
سری:
ISBN (شابک) : 9781119874867, 1119874866
ناشر: WILEY-SYBEX
سال نشر: 2022
تعداد صفحات: 834
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 6 مگابایت
در صورت تبدیل فایل کتاب The Official (ISC)2 SSCP CBK Reference به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مرجع رسمی (ISC)2 SSCP CBK نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Title Page Copyright Acknowledgments About the Author About the Technical Editor Foreword Introduction ABOUT THIS BOOK WHERE DO YOU GO FROM HERE? LET\'S GET STARTED! HOW TO CONTACT THE PUBLISHER CHAPTER 1: Security Operations and Administration COMPLY WITH CODES OF ETHICS UNDERSTAND SECURITY CONCEPTS DOCUMENT, IMPLEMENT, AND MAINTAIN FUNCTIONAL SECURITY CONTROLS PARTICIPATE IN ASSET MANAGEMENT IMPLEMENT SECURITY CONTROLS AND ASSESS COMPLIANCE PARTICIPATE IN CHANGE MANAGEMENT PARTICIPATE IN SECURITY AWARENESS AND TRAINING PARTICIPATE IN PHYSICAL SECURITY OPERATIONS SUMMARY CHAPTER 2: Access Controls ACCESS CONTROL CONCEPTS IMPLEMENT AND MAINTAIN AUTHENTICATION METHODS SUPPORT INTERNETWORK TRUST ARCHITECTURES PARTICIPATE IN THE IDENTITY MANAGEMENT LIFECYCLE IMPLEMENT ACCESS CONTROLS SUMMARY CHAPTER 3: Risk Identification, Monitoring, and Analysis DEFEATING THE KILL CHAIN ONE SKIRMISH AT A TIME UNDERSTAND THE RISK MANAGEMENT PROCESS PERFORM SECURITY ASSESSMENT ACTIVITIES OPERATE AND MAINTAIN MONITORING SYSTEMS ANALYZE MONITORING RESULTS SUMMARY CHAPTER 4: Incident Response and Recovery SUPPORT THE INCIDENT LIFECYCLE UNDERSTAND AND SUPPORT FORENSIC INVESTIGATIONS UNDERSTAND AND SUPPORT BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY PLAN ACTIVITIES CIANA+PS AT LAYER 8 AND ABOVE SUMMARY CHAPTER 5: Cryptography UNDERSTAND FUNDAMENTAL CONCEPTS OF CRYPTOGRAPHY CRYPTOGRAPHIC ATTACKS, CRYPTANALYSIS, AND COUNTERMEASURES UNDERSTAND THE REASONS AND REQUIREMENTS FOR CRYPTOGRAPHY UNDERSTAND AND SUPPORT SECURE PROTOCOLS UNDERSTAND PUBLIC KEY INFRASTRUCTURE SYSTEMS SUMMARY CHAPTER 6: Network and Communications Security UNDERSTAND AND APPLY FUNDAMENTAL CONCEPTS OF NETWORKING IPV4 ADDRESSES, DHCP, AND SUBNETS IPV4 VS. IPV6: KEY DIFFERENCES AND OPTIONS UNDERSTAND NETWORK ATTACKS AND COUNTERMEASURES MANAGE NETWORK ACCESS CONTROLS MANAGE NETWORK SECURITY OPERATE AND CONFIGURE NETWORK-BASED SECURITY DEVICES OPERATE AND CONFIGURE WIRELESS TECHNOLOGIES SUMMARY CHAPTER 7: Systems and Application Security SYSTEMS AND SOFTWARE INSECURITY INFORMATION SECURITY = INFORMATION QUALITY + INFORMATION INTEGRITY IDENTIFY AND ANALYZE MALICIOUS CODE AND ACTIVITY IMPLEMENT AND OPERATE ENDPOINT DEVICE SECURITY OPERATE AND CONFIGURE CLOUD SECURITY OPERATE AND SECURE VIRTUAL ENVIRONMENTS SUMMARY Appendix: Cross-Domain Challenges PARADIGM SHIFTS IN INFORMATION SECURITY? PIVOT 1: TURN THE ATTACKERS\' PLAYBOOKS AGAINST THEM PIVOT 2: CYBERSECURITY HYGIENE: THINK SMALL, ACT SMALL PIVOT 3: FLIP THE “DATA-DRIVEN VALUE FUNCTION” PIVOT 4: OPERATIONALIZE SECURITY ACROSS THE IMMEDIATE AND LONGER TERM PIVOT 5: ZERO-TRUST ARCHITECTURES AND OPERATIONS OTHER DANGERS ON THE WEB AND NET CURIOSITY AS COUNTERMEASURE Index