The official (ISC)2 CISSP CBK reference (Record no. 1819)

MARC details
000 -LEADER
fixed length control field 02042nam a2200241 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250804180028.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250804b2021|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119790013
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 016.391
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Deane, Arthur J.
Relator term Author
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Kraus, Aaron
Relator term Co-Author
245 ## - TITLE STATEMENT
Title The official (ISC)2 CISSP CBK reference
250 ## - EDITION STATEMENT
Edition statement 6th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2021.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxvi, 645p.
500 ## - GENERAL NOTE
General note The only official, comprehensive reference guide to the CISSP<br/><br/>Thoroughly updated for 2021 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024.<br/><br/>This CBK covers the current eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Revised and updated by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with:<br/><br/>Common and good practices for each objective<br/>Common vocabulary and definitions<br/>References to widely accepted computing standards<br/>Highlights of successful approaches through case studies<br/>Whether you've earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Security Architecture and Engineering
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Communication and Network Security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Security Assessment and Testing
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=9946650
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Coded location qualifier Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) --- 016.391 EB0243 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha