The Official (ISC)2 Guide to the CISSP CBK Reference


Super Savings Item! Free Shipping Included! Save 33% on the The Official (ISC)2 Guide to the CISSP CBK Reference by Wiley at SADC Network. Hurry! Limited time offer. Offer valid only while supplies last. The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024. This CBK c


The Official (ISC)2 Guide to the CISSP CBK Reference by Wiley
4.6 out of 5 stars with 52 reviews
Condition: New
Availability: In Stock
$90.00
$61.04
You Save: 32%


Quantity:  

 


Product Description & Reviews

The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024. This CBK covers the new eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Written by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with: •    Common and good practices for each objective •    Common vocabulary and definitions •    References to widely accepted computing standards •    Highlights of successful approaches through case studies Whether youve earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.

Features & Highlights

Additional Information

Manufacturer:
Wiley
Category:
Security & Encryption
EAN:
9781119423348
ISBN:
1119423341
Edition:
5
Author:
Array
Publisher:
Wiley
Publication Date:
2019-05-07
Binding:
Hardcover
Item Weight:
3.64 pounds
Item Size:
1.5 x 9.5 x 6.5 inches
Package Weight:
3.71 pounds
Package Size:
7.7 x 1.3 x 9.9 inches

 


Have questions about this item (9781119423348), or would like to inquire about a custom or bulk order?


If you have any questions about this product by Wiley, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Name:
Email Address:
Your Message:

Related Best Sellers


ean: 9781260458091, isbn: 1260458091,
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This Premium Bundle includes Mike Meyers’ bestselling exam g...

mpn: 9780134794105, ean: 9780134794105, isbn: 9780134794105,
For courses in computer/network security   Balancing principle and practice–an updated survey of the fast-moving world of computer and network security Computer Security: Principles and Practice, 4th Edition, is ideal for courses in Comput...

mpn: 9780521879965, ean: 9780521879965, isbn: 0521879965,
The multidisciplinary field of quantum computing strives to exploit some of the uncanny aspects of quantum mechanics to expand our computational horizons. Quantum Computing for Computer Scientists takes readers on a tour of this fascinating area of c...

mpn: 9780134085043, ean: 9780134085043, isbn: 9780134085043,
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer securi...