Security Operations
(eBook)
Description
Loading Description...
More Details
Format
eBook
Language
English
ISBN
9781393054795
Reviews from GoodReads
Loading GoodReads Reviews.
Citations
APA Citation (style guide)
Selwyn Classen., & Selwyn Classen|AUTHOR. (2020). Security Operations. Selwyn Classen.
Chicago / Turabian - Author Date Citation (style guide)Selwyn Classen and Selwyn Classen|AUTHOR. 2020. Security Operations. Selwyn Classen.
Chicago / Turabian - Humanities Citation (style guide)Selwyn Classen and Selwyn Classen|AUTHOR, Security Operations. Selwyn Classen, 2020.
MLA Citation (style guide)Selwyn Classen, and Selwyn Classen|AUTHOR. Security Operations. Selwyn Classen, 2020. Web.
Note! Citation formats are based on standards as of July 2010. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
Staff View
Grouping Information
Grouped Work ID | fa0cfcef-67ce-54fb-932d-f076f84c0420 |
---|---|
Full title | security operations |
Author | classen selwyn |
Grouping Category | book |
Last Update | 2020-10-01 07:50:54AM |
Last Indexed | 2021-01-17 05:09:03AM |
Book Cover Information
Image Source | hoopla |
---|---|
First Loaded | Jul 27, 2020 |
Last Used | Jul 27, 2020 |
Hoopla Extract Information
stdClass Object ( [year] => 2020 [artist] => Selwyn Classen [coverImageUrl] => https://d2snwnmzyr8jue.cloudfront.net/dra_9781393054795_270.jpeg [titleId] => 13367002 [isbn] => 9781393054795 [abridged] => [language] => ENGLISH [profanity] => [title] => Security Operations [demo] => [segments] => Array ( ) [children] => [artists] => Array ( [0] => stdClass Object ( [name] => Selwyn Classen [relationship] => AUTHOR ) ) [genres] => Array ( [0] => Computers [1] => Computers & Technology [2] => Education [3] => Internet [4] => Online Safety & Privacy ) [price] => 0.99 [id] => 13367002 [edited] => [kind] => EBOOK [active] => 1 [upc] => [synopsis] => Security Operations is the 7th domain of the CISSP's common body of knowledge. In this course we will cover some of the following topics: digital forensics, incident management, logging and monitoring, vulnerability and change management, investigative types, evidence handling an, recovery strategies, personnel privacy and safety, business continuity and disaster recovery, internal physical security, external physical security, and securing assets. [url] => https://www.hoopladigital.com/title/13367002 [pa] => [series] => CISSP [publisher] => Selwyn Classen ) 1