CCSP with online practice for dummies:
Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About this Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Starting Your CCSP Journey -- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
John Wiley & Sons, Inc.
[2021]
|
Schriftenreihe: | for dummies
learning made easy |
Schlagworte: | |
Online-Zugang: | FHN01 Lizenzpflichtig |
Zusammenfassung: | Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About this Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Starting Your CCSP Journey -- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification -- Appreciating (ISC)2 and the CCSP Certification -- Knowing Why You Need to Get Certified -- Studying the Prerequisites for the CCSP -- Understanding the CCSP Domains -- Domain 1: Cloud Concepts, Architecture and Design -- Domain 2: Cloud Data Security -- Domain 3: Cloud Platform and Infrastructure Security -- Domain 4: Cloud Application Security -- Domain 5: Cloud Security Operations -- Domain 6: Legal, Risk and Compliance -- Preparing for the Exam -- Studying on your own -- Learning by doing -- Getting official (ISC)2 CCSP training -- Attending other training courses -- Practice, practice, practice -- Ensuring you're ready for the exam -- Registering for the Exam -- Taking the Exam -- Identifying What to Do After the Exam -- Chapter 2 Identifying Information Security Fundamentals -- Exploring the Pillars of Information Security -- Confidentiality -- Integrity -- Availability -- Threats, Vulnerabilities, and Risks . . . Oh My! -- Threats -- Vulnerabilities -- Risks -- Securing Information with Access Control -- Deciphering Cryptography -- Encryption and decryption -- Types of encryption -- Common uses of encryption -- Grasping Physical Security -- Realizing the Importance of Business Continuity and Disaster Recovery -- Implementing Incident Handling -- Preparing for incidents -- Detecting incidents -- Containing incidents -- Eradicating incidents -- Recovering from incidents -- Conducting a Post-Mortem -- Utilizing Defense-in-Depth -- Part 2 Exploring the CCSP Certification Domains -- Chapter 3 Domain 1: Cloud Concepts, Architecture and Design |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (xiv, 350 Seiten) |
ISBN: | 9781119648369 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV047059421 | ||
003 | DE-604 | ||
005 | 20201214 | ||
007 | cr|uuu---uuuuu | ||
008 | 201211s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781119648369 |9 978-1-119-64836-9 | ||
035 | |a (OCoLC)1226707078 | ||
035 | |a (DE-599)KEP055762646 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-92 | ||
100 | 1 | |a Deane, Arthur J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a CCSP with online practice for dummies |c by Arthur J. Deane, CISSP, CCSP |
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons, Inc. |c [2021] | |
300 | |a 1 Online-Ressource (xiv, 350 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a for dummies | |
490 | 0 | |a learning made easy | |
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | 3 | |a Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About this Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Starting Your CCSP Journey -- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification -- Appreciating (ISC)2 and the CCSP Certification -- Knowing Why You Need to Get Certified -- Studying the Prerequisites for the CCSP -- Understanding the CCSP Domains -- Domain 1: Cloud Concepts, Architecture and Design -- Domain 2: Cloud Data Security -- Domain 3: Cloud Platform and Infrastructure Security -- Domain 4: Cloud Application Security -- Domain 5: Cloud Security Operations -- Domain 6: Legal, Risk and Compliance -- Preparing for the Exam -- Studying on your own -- Learning by doing -- Getting official (ISC)2 CCSP training -- Attending other training courses -- Practice, practice, practice -- Ensuring you're ready for the exam -- Registering for the Exam -- Taking the Exam -- Identifying What to Do After the Exam -- Chapter 2 Identifying Information Security Fundamentals -- Exploring the Pillars of Information Security -- Confidentiality -- Integrity -- Availability -- Threats, Vulnerabilities, and Risks . . . Oh My! -- Threats -- Vulnerabilities -- Risks -- Securing Information with Access Control -- Deciphering Cryptography -- Encryption and decryption -- Types of encryption -- Common uses of encryption -- Grasping Physical Security -- Realizing the Importance of Business Continuity and Disaster Recovery -- Implementing Incident Handling -- Preparing for incidents -- Detecting incidents -- Containing incidents -- Eradicating incidents -- Recovering from incidents -- Conducting a Post-Mortem -- Utilizing Defense-in-Depth -- Part 2 Exploring the CCSP Certification Domains -- Chapter 3 Domain 1: Cloud Concepts, Architecture and Design | |
653 | 0 | |a Electronic books | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-119-64837-6 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 978-1-119-64838-3 |
856 | 4 | 0 | |m X:EBC |u https://ebookcentral.proquest.com/lib/kxp/detail.action?docID=6320699 |x Aggregator |z Lizenzpflichtig |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032466621 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/thnuernberg/detail.action?docID=6320699 |l FHN01 |p ZDB-30-PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182053455921152 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Deane, Arthur J. |
author_facet | Deane, Arthur J. |
author_role | aut |
author_sort | Deane, Arthur J. |
author_variant | a j d aj ajd |
building | Verbundindex |
bvnumber | BV047059421 |
collection | ZDB-30-PQE |
ctrlnum | (OCoLC)1226707078 (DE-599)KEP055762646 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03267nmm a22003731c 4500</leader><controlfield tag="001">BV047059421</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201214 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201211s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119648369</subfield><subfield code="9">978-1-119-64836-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1226707078</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP055762646</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Deane, Arthur J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">CCSP with online practice for dummies</subfield><subfield code="c">by Arthur J. Deane, CISSP, CCSP</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 350 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">for dummies</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">learning made easy</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About this Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Starting Your CCSP Journey -- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification -- Appreciating (ISC)2 and the CCSP Certification -- Knowing Why You Need to Get Certified -- Studying the Prerequisites for the CCSP -- Understanding the CCSP Domains -- Domain 1: Cloud Concepts, Architecture and Design -- Domain 2: Cloud Data Security -- Domain 3: Cloud Platform and Infrastructure Security -- Domain 4: Cloud Application Security -- Domain 5: Cloud Security Operations -- Domain 6: Legal, Risk and Compliance -- Preparing for the Exam -- Studying on your own -- Learning by doing -- Getting official (ISC)2 CCSP training -- Attending other training courses -- Practice, practice, practice -- Ensuring you're ready for the exam -- Registering for the Exam -- Taking the Exam -- Identifying What to Do After the Exam -- Chapter 2 Identifying Information Security Fundamentals -- Exploring the Pillars of Information Security -- Confidentiality -- Integrity -- Availability -- Threats, Vulnerabilities, and Risks . . . Oh My! -- Threats -- Vulnerabilities -- Risks -- Securing Information with Access Control -- Deciphering Cryptography -- Encryption and decryption -- Types of encryption -- Common uses of encryption -- Grasping Physical Security -- Realizing the Importance of Business Continuity and Disaster Recovery -- Implementing Incident Handling -- Preparing for incidents -- Detecting incidents -- Containing incidents -- Eradicating incidents -- Recovering from incidents -- Conducting a Post-Mortem -- Utilizing Defense-in-Depth -- Part 2 Exploring the CCSP Certification Domains -- Chapter 3 Domain 1: Cloud Concepts, Architecture and Design</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic books</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-119-64837-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-1-119-64838-3</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="m">X:EBC</subfield><subfield code="u">https://ebookcentral.proquest.com/lib/kxp/detail.action?docID=6320699</subfield><subfield code="x">Aggregator</subfield><subfield code="z">Lizenzpflichtig</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032466621</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/thnuernberg/detail.action?docID=6320699</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047059421 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:11:05Z |
indexdate | 2024-07-10T09:01:26Z |
institution | BVB |
isbn | 9781119648369 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032466621 |
oclc_num | 1226707078 |
open_access_boolean | |
owner | DE-92 |
owner_facet | DE-92 |
physical | 1 Online-Ressource (xiv, 350 Seiten) |
psigel | ZDB-30-PQE |
publishDate | 2021 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
series2 | for dummies learning made easy |
spelling | Deane, Arthur J. Verfasser aut CCSP with online practice for dummies by Arthur J. Deane, CISSP, CCSP Hoboken, NJ John Wiley & Sons, Inc. [2021] 1 Online-Ressource (xiv, 350 Seiten) txt rdacontent c rdamedia cr rdacarrier for dummies learning made easy Description based on publisher supplied metadata and other sources Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About this Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Starting Your CCSP Journey -- Chapter 1 Familiarizing Yourself with (ISC)2 and the CCSP Certification -- Appreciating (ISC)2 and the CCSP Certification -- Knowing Why You Need to Get Certified -- Studying the Prerequisites for the CCSP -- Understanding the CCSP Domains -- Domain 1: Cloud Concepts, Architecture and Design -- Domain 2: Cloud Data Security -- Domain 3: Cloud Platform and Infrastructure Security -- Domain 4: Cloud Application Security -- Domain 5: Cloud Security Operations -- Domain 6: Legal, Risk and Compliance -- Preparing for the Exam -- Studying on your own -- Learning by doing -- Getting official (ISC)2 CCSP training -- Attending other training courses -- Practice, practice, practice -- Ensuring you're ready for the exam -- Registering for the Exam -- Taking the Exam -- Identifying What to Do After the Exam -- Chapter 2 Identifying Information Security Fundamentals -- Exploring the Pillars of Information Security -- Confidentiality -- Integrity -- Availability -- Threats, Vulnerabilities, and Risks . . . Oh My! -- Threats -- Vulnerabilities -- Risks -- Securing Information with Access Control -- Deciphering Cryptography -- Encryption and decryption -- Types of encryption -- Common uses of encryption -- Grasping Physical Security -- Realizing the Importance of Business Continuity and Disaster Recovery -- Implementing Incident Handling -- Preparing for incidents -- Detecting incidents -- Containing incidents -- Eradicating incidents -- Recovering from incidents -- Conducting a Post-Mortem -- Utilizing Defense-in-Depth -- Part 2 Exploring the CCSP Certification Domains -- Chapter 3 Domain 1: Cloud Concepts, Architecture and Design Electronic books Erscheint auch als Druck-Ausgabe 978-1-119-64837-6 Erscheint auch als Online-Ausgabe, EPUB 978-1-119-64838-3 X:EBC https://ebookcentral.proquest.com/lib/kxp/detail.action?docID=6320699 Aggregator Lizenzpflichtig |
spellingShingle | Deane, Arthur J. CCSP with online practice for dummies |
title | CCSP with online practice for dummies |
title_auth | CCSP with online practice for dummies |
title_exact_search | CCSP with online practice for dummies |
title_exact_search_txtP | CCSP with online practice for dummies |
title_full | CCSP with online practice for dummies by Arthur J. Deane, CISSP, CCSP |
title_fullStr | CCSP with online practice for dummies by Arthur J. Deane, CISSP, CCSP |
title_full_unstemmed | CCSP with online practice for dummies by Arthur J. Deane, CISSP, CCSP |
title_short | CCSP with online practice for dummies |
title_sort | ccsp with online practice for dummies |
url | https://ebookcentral.proquest.com/lib/kxp/detail.action?docID=6320699 |
work_keys_str_mv | AT deanearthurj ccspwithonlinepracticefordummies |