ฟังและอ่าน

ก้าวเข้าสู่โลกแห่งเรื่องราวอันไม่มีที่สิ้นสุด

  • อ่านและฟังได้มากเท่าที่คุณต้องการ
  • มากกว่า 1 ล้านชื่อ
  • Storytel Originals ผลงานเฉพาะบน Storytel
  • 199บ./ด.
  • ยกเลิกได้ทุกเมื่อ
เริ่ม
Details page - Device banner - 894x1036
Cover for CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies

CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies

2 คะแนน

3

ระยะเวลา
11 ชม. 3 น.
ภาษา
ภาษาอังกฤษ
รูปแบบ
คอลเลกชัน

นอนฟิกชั่น

2 AUDIOBOOKS IN 1 DEAL!

• book 1 - nist cybersecurity framework: beginners guide to measure risk, systems, security controls and monitoring • book 2 - risk management governance strategies: risk ownership strategies, risk analysis, risk response & risk monitoring

In book 1 you will discover:

compliance, security & riskrisk management framework fundamentalsnist cybersecurity framework fundamentalsrisk tiers, systems and authorizationroles and responsibilities & privacyhow to prepare for system-level taskshow to select security controlshow to assess security controlsrmf specific tasks fundamentalshow to authorize information systemshow to monitor security controlshow to monitor systemsincident response team roles, skills, and tools

In book 2 you will discover:

information assets fundamentalsinformation asset & risk ownershipfisma nist, hipaa and pci-dssrisk management governance & risk strategylikelihood, impact & riskinternal and external risk factorsrisk assessments & risk scenarioshow to conduct the nist assessmenthow to calculate & reassess riskhow to implement risk responsehow to analyse cost & benefithow to prioritize & respond to riskcontrol types & control functions and more...

© 2021 HUGO HOFFMAN (หนังสือเสียง): 9781669601951

วันเปิดตัว

หนังสือเสียง: 17 พฤศจิกายน 2564

แท็ก

    คนอื่นก็สนุก...

    1. Cybersecutity First Principles
      Cybersecutity First Principles Rick Howard
    2. The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future
      The Energy Wars – The Future of Renewable Energy & Sustainability: How Solar, Wind, and Nuclear Are Shaping the Battle for a Greener Future James Nemeth
    3. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals
      RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
    4. Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles
      Inevitable: Inside the Messy, Unstoppable Transition to Electric Vehicles Mike Colias
    5. Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1
      Cybersecurity For Beginners: How To Implement The NIST Framework To Guard Against The Most Common Security Threats | 2 Books In 1 HUGO HOFFMAN
    6. Spatial Computing
      Spatial Computing Pamela Vold
    7. The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence
      The Rise of the Cobot: Grow Your Business Exponentially with Collaborative Artificial Intelligence John Rauscher
    8. Web3: Charting the Internet's Next Economic and Cultural Frontier
      Web3: Charting the Internet's Next Economic and Cultural Frontier Alex Tapscott
    9. The #PACE Process for Early Career Success
      The #PACE Process for Early Career Success Mark Zides
    10. CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1
      CISSP And Cybersecurity For Beginners: Penetration Testing And Ethical Hacking Techniques To Defend Your Infrastructure 3 Books In 1 John Knowles
    11. The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework
      The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Mathieu Gorge
    12. The Boomerang Principle: Inspire Lifetime Loyalty from Your Employees
      The Boomerang Principle: Inspire Lifetime Loyalty from Your Employees Lee Caraher
    13. A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050
      A Brief History of a Perfect Future: Inventing the world that we can proudly leave our kids by 2050 Paul B. Carroll
    14. Leaving the Golden Cage: A hands-on guide to starting and building your life science consulting practice
      Leaving the Golden Cage: A hands-on guide to starting and building your life science consulting practice Norbert Farkas
    15. Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers
      Designing Transformative Experiences: A Toolkit for Leaders, Trainers, Teachers, and other Experience Designers Brad McLain
    16. Distrust: Big Data, Data-Torturing, and the Assault on Science
      Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
    17. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
      Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    18. Business Ethics for Better Behavior
      Business Ethics for Better Behavior Jason Brennan
    19. The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy
      The Anti-Oligarchy Constitution: Reconstructing the Economic Foundations of American Democracy William E. Forbath
    20. Working Machines: An Executive’s Guide to AI and Intelligent Automation
      Working Machines: An Executive’s Guide to AI and Intelligent Automation Mario Grunitz
    21. Cloud Security For Dummies
      Cloud Security For Dummies Ted Coombs
    22. Certified Information Security Manager CISM Study Guide
      Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
    23. Born Digital: The Story of a Distracted Generation
      Born Digital: The Story of a Distracted Generation Robert Wigley
    24. Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation
      Tech Agnostic: How Technology Became the World’s Most Powerful Religion, and Why It Desperately Needs a Reformation Greg M. Epstein
    25. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business
      8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    26. Create the Future: Tactics for Disruptive Thinking
      Create the Future: Tactics for Disruptive Thinking Jeremy Gutsche
    27. GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights
      GINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Ferris Eanfar
    28. The DevSecOps Playbook: Deliver Continuous Security at Speed
      The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    29. Transhumanistic Solar System
      Transhumanistic Solar System Allen Young
    30. The Art of Attack: Attacker Mindset for Security Professionals
      The Art of Attack: Attacker Mindset for Security Professionals Maxie Reynolds
    31. Long Hard Road: The Lithium-Ion Battery and the Electric Car
      Long Hard Road: The Lithium-Ion Battery and the Electric Car Charles J. Murray
    32. The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production
      The New Technology Elite: How Great Companies Optimize Both Technology Consumption and Production Vinnie Mirchandani
    33. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1
      CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    34. Choosing Leadership: Revised and Expanded: How to Create a Better Future by Building Your Courage, Capacity, and Wisdom
      Choosing Leadership: Revised and Expanded: How to Create a Better Future by Building Your Courage, Capacity, and Wisdom Linda Ginzel, PhD
    35. The Great Persuasion: Reinventing Free Markets Since the Depression
      The Great Persuasion: Reinventing Free Markets Since the Depression Angus Burgin
    36. Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process
      Winning at the Acquisition Game : Tools, Templates and Best Practices Across the M&A Process: Tools, Templates, and Best Practices Across the M&A Process Timothy Galpin
    37. Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
      Cyber Intelligence Driven Risk: How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions Richard O. Moore III
    38. Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design
      Industrial Designs: Ideas and Inventive Problem Solving for Industrial Design Phil Gilberts
    39. Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
      Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 HUGO HOFFMAN
    40. The Truth about Energy, Global Warming, and Climate Change: Exposing Climate Lies in an Age of Disinformation
      The Truth about Energy, Global Warming, and Climate Change: Exposing Climate Lies in an Age of Disinformation Jerome R. Corsi, Ph.D.
    41. Herd: How to Change Mass Behaviour by Harnessing Our True Nature
      Herd: How to Change Mass Behaviour by Harnessing Our True Nature Mark Earls
    42. The Cloud Revolution: How the Convergence of New Technologies Will Unleash the Next Economic Boom and A Roaring 2020s
      The Cloud Revolution: How the Convergence of New Technologies Will Unleash the Next Economic Boom and A Roaring 2020s Mark P. Mills
    43. Creepy Analytics: Avoid Crossing the Line and Establish Ethical HR Analytics for Smarter Workforce Decisions
      Creepy Analytics: Avoid Crossing the Line and Establish Ethical HR Analytics for Smarter Workforce Decisions Salvatore V. Falletta
    44. Business Models for the Social Mobile Cloud: Transform Your Business Using Social Media, Mobile Internet, and Cloud Computing
      Business Models for the Social Mobile Cloud: Transform Your Business Using Social Media, Mobile Internet, and Cloud Computing Ted Shelton
    45. Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants
      Competition Overdose: How Free Market Mythology Transformed Us from Citizen Kings to Market Servants Maurice E. Stucke
    46. How to Measure Anything in Cybersecurity Risk, 2nd Edition
      How to Measure Anything in Cybersecurity Risk, 2nd Edition Douglas W. Hubbard
    47. Open Talent: Leveraging the Global Workforce to Solve Your Biggest Challenges
      Open Talent: Leveraging the Global Workforce to Solve Your Biggest Challenges Jin H. Paik
    48. Beyond Traditional: Unlocking the Potential of Alternative Assets
      Beyond Traditional: Unlocking the Potential of Alternative Assets Chad R. Larson
    49. Rattiner’s Secrets of Financial Planning: From Running Your Practice to Optimizing Your Client's Experience
      Rattiner’s Secrets of Financial Planning: From Running Your Practice to Optimizing Your Client's Experience Jeffrey H. Rattiner
    50. The Ostrich Paradox: Why We Underprepare for Disasters
      The Ostrich Paradox: Why We Underprepare for Disasters Howard Kunreuther
    51. Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design
      Not Very Intelligent Design: On the Origin, Creation and Evolution of the Theory of Intelligent Design Neel Ingman
    52. Security Awareness For Dummies
      Security Awareness For Dummies Ira Winkler, CISSP
    53. The Rise of Open Source Software
      The Rise of Open Source Software Introbooks Team
    54. How Big-Tech Barons Smash Innovation—and How to Strike Back
      How Big-Tech Barons Smash Innovation—and How to Strike Back Maurice E. Stucke
    55. Lucky by Design: The Hidden Economics You Need to Get More of What You Want
      Lucky by Design: The Hidden Economics You Need to Get More of What You Want Judd Kessler
    56. The Deal Maker: How William C. Durant Made General Motors
      The Deal Maker: How William C. Durant Made General Motors Axel Madsen
    57. ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing
      ChatGPT for Nonfiction Authors: How AI Can Improve Your Writing Acquilia Awa
    58. Good Influence: How to Engage Influencers for Purpose and Profit
      Good Influence: How to Engage Influencers for Purpose and Profit Paul M. Katz
    59. AI WITH US, OR US WITH THE AI?: GPT AND OTHERS AMONG MANKIND
      AI WITH US, OR US WITH THE AI?: GPT AND OTHERS AMONG MANKIND Pavel Zlatnik
    60. Critical Thinking and Analytical Mind: The Art of Making Decisions and Solving Problems. Think Clearly, Avoid Cognitive Biases and Fallacies in Systems. Improve Listening Skills. Be a Logical Thinker
      Critical Thinking and Analytical Mind: The Art of Making Decisions and Solving Problems. Think Clearly, Avoid Cognitive Biases and Fallacies in Systems. Improve Listening Skills. Be a Logical Thinker Marcus P. Dawson
    61. Understanding the Metaverse: A Business and Ethical Guide
      Understanding the Metaverse: A Business and Ethical Guide Nick Rosa
    62. From Breakthrough to Blockbuster: The Business of Biotechnology
      From Breakthrough to Blockbuster: The Business of Biotechnology Donald L. Drakeman
    63. Decision Intelligence: Transform Your Team and Organization with AI-Driven Decision-Making
      Decision Intelligence: Transform Your Team and Organization with AI-Driven Decision-Making Thorsten Heilig
    64. Cybersecurity for Beginners: How to Defend Against Hackers & Malware
      Cybersecurity for Beginners: How to Defend Against Hackers & Malware ATTILA KOVACS
    65. How to Speak Science: Gravity, Relativity, and Other Ideas That Were Crazy until Proven Brilliant
      How to Speak Science: Gravity, Relativity, and Other Ideas That Were Crazy until Proven Brilliant Bruce Benamran
    66. The World After Capital
      The World After Capital Albert Wenger
    67. Probability Theory
      Probability Theory Introbooks Team
    68. Edge of Armageddon: The Imminent Nuclear Consequence
      Edge of Armageddon: The Imminent Nuclear Consequence Robert Enochs
    69. Negotiating with Giants: Get what you want against the odds
      Negotiating with Giants: Get what you want against the odds Peter D. Johnston
    70. Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1
      Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics - 2 Books In 1 ATTILA KOVACS
    71. Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
      Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Perry Carpenter
    72. A Bias for Action: How Effective Managers Harness Their Willpower, Achieve Results, and Stop Wasting Time
      A Bias for Action: How Effective Managers Harness Their Willpower, Achieve Results, and Stop Wasting Time Sumantra Ghoshal
    73. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601)
      CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Wm. Arthur Conklin
    74. TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments
      TouchPoints: Creating Powerful Leadership Connections in the Smallest of Moments Mette Norgaard
    75. Digital Transformation in the Electronics Industry: Business and Technical Evolution in Electronic Components Procurement
      Digital Transformation in the Electronics Industry: Business and Technical Evolution in Electronic Components Procurement Casimir Saternos
    76. Critical Thinking Growth for Problem Solving and Decision Making: Create a Positive Mind Set for Thinking
      Critical Thinking Growth for Problem Solving and Decision Making: Create a Positive Mind Set for Thinking Eric J Kelly
    77. Leadership for a Digital World: The Transformation of GE Appliances
      Leadership for a Digital World: The Transformation of GE Appliances Annika Steiber
    78. You Can't Order Change: Lessons from Jim McNerney's Turnaround at Boeing
      You Can't Order Change: Lessons from Jim McNerney's Turnaround at Boeing Peter S. Cohan
    79. Artificial Intelligence: Machine Learning, Deep Learning, and Automation Processes
      Artificial Intelligence: Machine Learning, Deep Learning, and Automation Processes John Adamssen

    ทุกที่ ทุกเวลากับ Storytel:

    • กว่า 500 000 รายการ

    • Kids Mode (เนื้อหาที่ปลอดภัยสำหรับเด็ก)

    • ดาวน์โหลดหนังสือสำหรับการเข้าถึงแบบออฟไลน์

    • ยกเลิกได้ตลอดเวลา

    ที่นิยมมากที่สุด

    Unlimited

    สำหรับผู้ที่ต้องการฟังและอ่านอย่างไม่จำกัด

    199 บ. /เดือน
    • 1 บัญชี

    • การเข้าถึงแบบไม่ จำกัด

    • 1 บัญชี

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม

    Family

    สำหรับผู้ที่ต้องการแบ่งปันเรื่องราวกับครอบครัวและเพื่อน

    349 บ. /เดือน
    • 3 บัญชี

    • การเข้าถึงแบบไม่ จำกัด

    • ฟังได้ไม่จำกัด

    • ยกเลิกได้ทุกเมื่อ

    เริ่ม