Part 1 The Need for Information Security
Ch1: Information Systems Security
Ch2: Changing the Way People and Businesses do Business
Ch3: Malicious Attacks, Threats, and Vulnerabilities
Ch4: The Drivers of Information Security Business
Part 2 The Systems Security Certified Practitioner (SSCP) Professional Certification from (ISC)2
Ch5: Access Controls
Ch6: Security Operations and Administration
Ch7: Auditing, Testing, and Monitoring
Ch8: Risk, Response, and Recovery
Ch9: Cryptography
Ch10: Networks and Communications
Ch11: Malicious Code and Activity
Part 3 Information Security Standards, Education, Certification, and Laws
Ch12: Information Security Standards
Ch13: Information Security Education and Training
Ch14: Information Security Professional Certifications
Ch15: US Compliance Laws
本站所有內容均為互聯網搜尋引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度,google,bing,sogou 等
© 2025 ttbooks.qciss.net All Rights Reserved. 小特书站 版權所有