Warehouse Stock Clearance Sale

Grab a bargain today!


Cissp Bundle, Fourth Edition
By

Rating

Product Description
Product Details

Table of Contents

CISSP® All-in-One Exam Guide, Eighth Edition
Chapter 1: Security and Risk Management
Chapter 2: Asset Security
Chapter 3: Security Engineering
Chapter 4: Communication and Network Security
Chapter 5: Identity and Access Management
Chapter 6: Security Assessment and Testing
Chapter 7: Security Operations
Chapter 8: Software Development Security
Glossary

CISSP® Practice Exams, Fifth Edition
Chapter 1: Security and Risk Management
Chapter 2: Asset Security
Chapter 3: Security Engineering
Chapter 4: Communication and Network Security
Chapter 5: Identity and Access Management
Chapter 6: Security Assessment and Testing
Chapter 7: Security Operations
Chapter 8: Software Development Security

About the Author

Shon Harris, CISSP, was the founder and CEO of Shon Harris Security LLC and Logical Security LLC, a security consultant, a former engineer in the Air Force’s Information Warfare unit, and an instructor. She authored three bestselling CISSP books and was a contributing author to Gray Hat Hacking: The Ethical Hacker’s Handbook and Security Information and Event Management (SIEM) Implementation.


Fernando Maymí, Ph.D., CISSP, is a security practitioner with over 25 years of experience. He is currently the Lead Scientist in the cyber division at Soar Technology, Inc., where he researches and develops solutions at the intersection of cyberspace operations and artificial intelligence. Dr. Maymí is the author of over a dozen publications and holds three patents. 


Jonathan Ham, CISSP, GSEC, GCIA, GCIH, is an independent consultant who specializes in large-scale enterprise security issues. He is a member of the GIAC Advisory Board and is a SANS instructor teaching their MGT414: SANS training program for CISSP certification. He is co-author of Network Forensics: Tracking Hackers through Cyberspace.

Ask a Question About this Product More...
 
Look for similar items by category
Home » Books » Computers » Security » Networking
People also searched for
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top
We use essential and some optional cookies to provide you the best shopping experience. Visit our cookies policy page for more information.