Official (ISC)2 Guide to the CISSP CBK · 3rd Edition ((ISC)2 Press)

Official (ISC)2 Guide to the CISSP CBK · 3rd Edition ((ISC)2 Press)
Authors
Hernandez CISSP, Steven
Publisher
University of Illinois Press
Tags
code , domain 5 , components , functions , restoration , domain 1 , critical , device , import , owasp , life cycle , osi , information , domain 3 , fire , preventative , standards , data , rainbow tables , operations , classification , privacy , domain 10 , embeded , process , cbk , prevention , patch , flow , utilities , program , operation , record , grid , risk , message , area , regulatory , professional , analysis , digests , public key infrastructure , threats , science , defense , property , cryptology , distributed , ownership , philosophy , steganography , disaster , alrernatives , access controls , licensing , strategies , software , digital , processes , export , key escrow , room , iss , governance , computer , water , equipment , programming languages , identify , confidentiality , web , ip , protocols , hybrid , scalable , resillience , assess , spof , entitlement , development , compliance , attacks , asset , exercise , authentication , internal , procurement , least privilege , brute force , diligence , resource , network , policy , documentation , signatures , committees , system , rotation , privilege , issues , project , baselines , regulation , threat modeling: asset , xml , facilities , vendor , education , document , business impact analysis , limitations , database , hashing , domain 7 , multimedia , stratagies , special , continuity , contractor , data in transit , perimeter , application , concepts , monitoring , forencic , seperation of duties , controls , retention , aggregation , data at rest , management , frameworks , business , collaberation , plan , countermeasure , develop , vulnerabilities , data center , attack , metrics , environmental , warehousing , voice , scope , contract , hardware , integrity , investigation , symmetric , responsibilities , access control , single point of failure , categorization , audits , work , cahnnels , trusted platform , audit , maturity , key , safety , secure , distribution , hvac , buffer , organization , models , valuation , lifecycle , training , platform , multi-level , contractual , prioritize , (isc)2 , vulnerability , crime , engineering , storing , data mining , cissp , maintain , defense-in-depth , destroying , procedures , handling , marking , roles , facility , media , cloud , restricted , server , software security , protection , detection , trans-border , documenting , saml , remote , reporting , ethics , peer-to-peer , due care , legal , hiding , outages , control , logging , inference , implement , applets , provisioning , tolerance , maximum tolerable downtime , source code , certificate , social , end-point , review , destruction , asymmetric , response , domain 6 , securing , requirements , technology , architecture , tcp , intellectual , budget , job , communications , need-to-know , multi-layer , strategy , drp , change , site , watermarking , emanations , considerations , design , domain 9 , security , pki , busines , fault , devices , exposure , assessment , telecommunications , monitor , service , domain 4 , access , personnel , cryptography , isc2 , virtualization , cyber , valutaion , bia , cipher-text , agreement , state , suppression , networking , configuration , transmission , peer , integration , policies , change management , cipher , domain 8 , identification , creation , recovery , communication , resources , storage , availability , incident , objectives , sensitive , maintenance , security functions , physical , guidelines , implementation , consultant , remediation
ISBN
9780252725463
Date
1949-01-01T00:00:00+00:00
Size
15.18 MB
Lang
en
Downloaded: 379 times

Scientific knowledge grows at a phenomenal pace--but few books have had as lasting an impact or played as important a role in our modern world as *The Mathematical Theory of Communication* , published originally as a paper on communication theory more than fifty years ago. Republished in book form shortly thereafter, it has since gone through four hardcover and sixteen paperback printings.  It is a revolutionary work, astounding in its foresight and contemporaneity.  The University of Illinois Press is pleased and honored to issue this commemorative reprinting of a classic.