Login

The Official (ISC)2 Guide to the CCSP CBK

 - The Official (ISC)2 Guide to the CCSP CBK, ebook

90,25€

Ebook, ePUB with Adobe DRM
ISBN: 9781119276746
DRM Restrictions

Printing163 pages with an additional page accrued every 5 hours, capped at 163 pages
Copy to clipboard5 excerpts

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. TheOfficial (ISC)2Guide to the CCSPSMCBK Second Edition is your ticket for expert insight through the 6 CCSP domains. You will find step-by-step guidance through real-life scenarios, illustrated examples, tables, best practices, and more. This Second Edition features clearer diagrams as well as refined explanations based on extensive expert feedback. Sample questions help you reinforce what you have learned and prepare smarter.

Numerous illustrated examples and tables are included to demonstrate concepts, frameworks and real-life scenarios. The book offers step-by-step guidance through each of CCSP’s domains, including best practices and techniques used by the world's most experienced practitioners. Developed by (ISC)², endorsed by the Cloud Security Alliance® (CSA) and compiled and reviewed by cloud security experts across the world, this book brings together a global, thorough perspective. The Official (ISC)² Guide to the CCSP CBK should be utilized as your fundamental study tool in preparation for the CCSP exam and provides a comprehensive reference that will serve you for years to come.

Keywords: cloud, security, CCSP, CISSP, CISA, SSCP, IaaS, PaaS, SaaS, NIST, cryptography, access control, virtualization security, cyber threats, data loss, denial of service, OWASP, business continuity, disaster recovery planning, data storage, encryption, bit splitting, data classification, data privacy, privacy level agreement, software defined networking, SDN, BCDR, software development lifecycle, SDLC, threat modeling, STRIDE threat model, federated identity management, SSO, tokenization, data masking, sandboxing, ISO/IEC 27034-1, application security testing, network isolation, transport layer security, domain name system, internet protocol security, IPSec, patch management, defense in depth, honeypots, vulnerability assessment, compliance, cloud forensics, ISO/IEC 27050-1, ISO/IEC 27018, generally accepted privacy principles, GAPP, ISO 27001:2013, risk mitigation, ISO 28000:2007, cloud, security, CCSP, CISSP, CISA, SSCP, IaaS, PaaS, SaaS, NIST, cryptography, access control, virtualization security, cyber threats, data loss, denial of service, OWASP, business continuity, disaster recovery planning, data storage, encryption, bit splitting, data classification, data privacy, privacy level agreement, software defined networking, SDN, BCDR, software development lifecycle, SDLC, threat modeling, STRIDE threat model, federated identity management, SSO, tokenization, data masking, sandboxing, ISO/IEC 27034-1, application security testing, network isolation, transport layer security, domain name system, internet protocol security, IPSec, patch management, defense in depth, honeypots, vulnerability assessment, compliance, cloud forensics, ISO/IEC 27050-1, ISO/IEC 27018, generally accepted privacy principles, GAPP, ISO 27001:2013, risk mitigation, ISO 28000:2007, Computer Security & Cryptography

Publisher
John Wiley and Sons, Inc.
Publication year
2016
Language
en
Edition
2
Page amount
544 pages
Category
Information Technology, Telecommunications
Format
Ebook
eISBN (ePUB)
9781119276746
Printed ISBN
9781119276722

Similar titles