Essential CISM: Updated for the 15th Edition CISM Review Manual

دانلود کتاب Essential CISM: Updated for the 15th Edition CISM Review Manual

50000 تومان موجود

کتاب Essential CISM: برای نسخه پانزدهم کتابچه راهنمای بررسی CISM به روز شد نسخه زبان اصلی

دانلود کتاب Essential CISM: برای نسخه پانزدهم کتابچه راهنمای بررسی CISM به روز شد بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 11


توضیحاتی در مورد کتاب Essential CISM: Updated for the 15th Edition CISM Review Manual

نام کتاب : Essential CISM: Updated for the 15th Edition CISM Review Manual
عنوان ترجمه شده به فارسی : Essential CISM: برای نسخه پانزدهم کتابچه راهنمای بررسی CISM به روز شد
سری :
نویسندگان :
ناشر : Independently published
سال نشر : 2018
تعداد صفحات : 364
ISBN (شابک) : 1980684421 , 9781980684428
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 3 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


ESSENTIAL
CISM
Contents
Figures
Tables
About the Exam
How to Use This Book
An audio version of this print book is available on audible.com!
Section 1: The Basics
Chapter 1: Security Concepts
Chapter 2: Governance, Goals, Strategies, Policies, Standards and Procedures
Chapter 3: Strategy
Chapter 4: Risk Appetite, Tolerance and Capacity
Chapter 5: Analysis of Risk
Chapter 6: Controlling Threats and Risk
Chapter 7: Controls and Countermeasures
Chapter 8: ALE, RTO, RPO, SDO, MTO, MTD and AIW
Chapter 9: BCP, DRP and BIA
Chapter 10: Business Continuity and Disaster Recovery
Chapter 11: Testing Incident Response, Business Continuity Plans and Disaster Recovery Plans
Chapter 12: Roles, Responsibilities, RACI and Skills
Chapter 13: Due Diligence and Due Care
Chapter 14: Security Principles
Chapter 15: KGIs, KPIs, KRIs and CSFs
Chapter 16: Technologies
Chapter 17: Standards and Frameworks
Chapter 18: Culture
Chapter 19: Metrics
Chapter 20: Current State, Desired State and the Gap In-Between
Chapter 21: Information Security Infrastructure and Architecture
Chapter 22: Cloud Computing
Chapter 23: Metrics Development
Chapter 24: Business Model for Information Security (BMIS)
Section 2: The Four Domains
Chapter 25: Information Security Governance – Overview
Chapter 26: Information Security Governance – The Goal
Chapter 27: Information Security Governance – The Strategy
Chapter 28: Information Security Governance – Who Does What
Chapter 29: Information Security Governance – Resources That Help
Chapter 30: Information Security Governance – Constraints That Hurt
Chapter 31: Information Security Governance – The Action Plan
Chapter 32: Information Security Governance – Metrics and Monitoring
Chapter 33: Information Security Governance – What Success Looks Like
Chapter 34: Information Risk Management – Overview
Chapter 35: Information Risk Management – The Goal
Chapter 36: Information Risk Management – The Strategy
Chapter 37: Information Risk Management – Who Does What
Chapter 38: Information Risk Management – Resources That Help
Chapter 39: Information Risk Management – Constraints That Hurt
Chapter 40: Information Risk Management – The Action Plan
Chapter 41: Information Risk Management – Metrics, Monitoring and Reporting
Chapter 42: Information Risk Management – What Success Looks Like
Chapter 43: Information Security Program Development and Management – Overview
Chapter 44: Information Security Program Development and Management – The Goal
Chapter 45: Information Security Program Development and Management – The Strategy
Chapter 46: Information Security Program Development and Management – Who Does What
Chapter 47: Information Security Program Development and Management – Resources That Help
Chapter 48: Information Security Program Development and Management – Constraints That Hurt
Chapter 49: Information Security Program Development and Management – The Action Plan
Chapter 50: Information Security Program Development and Management – Metrics and Monitoring
Chapter 51: Information Security Program Development and Management – What Success Looks Like
Chapter 52: Information Security Incident Management – Overview
Chapter 53: Information Security Incident Management – The Goal
Chapter 54: Information Security Incident Management – The Strategy
Chapter 55: Information Security Incident Management – Who Does What
Chapter 56: Information Security Incident Management – Resources That Help
Chapter 57: Information Security Incident Management – Constraints That Hurt
Chapter 58: Information Security Incident Management – The Action Plan
Chapter 59: Information Security Incident Management – Metrics and Monitoring
Chapter 60-: Information Security Incident Management – What Success Looks Like
Acronyms
Definitions
Index




پست ها تصادفی