The official (ISC)2 CISSP CBK reference (Record no. 1819)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02042nam a2200241 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250804180028.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250804b2021|||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119790013 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | English |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 016.391 |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Deane, Arthur J. |
| Relator term | Author |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Kraus, Aaron |
| Relator term | Co-Author |
| 245 ## - TITLE STATEMENT | |
| Title | The official (ISC)2 CISSP CBK reference |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 6th ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | New Jersey: |
| Name of publisher | Wiley Data and Cybersecurity, |
| Year of publication | 2021. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xxvi, 645p. |
| 500 ## - GENERAL NOTE | |
| General note | The only official, comprehensive reference guide to the CISSP<br/><br/>Thoroughly updated for 2021 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024.<br/><br/>This CBK covers the current eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Revised and updated by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with:<br/><br/>Common and good practices for each objective<br/>Common vocabulary and definitions<br/>References to widely accepted computing standards<br/>Highlights of successful approaches through case studies<br/>Whether you've earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Security Architecture and Engineering |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Communication and Network Security |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Security Assessment and Testing |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=9946650 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | e-Books |
| Withdrawn status | Lost status | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Coded location qualifier | Full call number | Accession Number | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|
| Dr. S. R. Ranganathan Library | Dr. S. R. Ranganathan Library | Ebook (Online Access) | --- | 016.391 | EB0243 | e-Books |