|
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert insight through the 6 CCSP domains. You will find step-by-step guidance through real-life scenarios, illustrated examples, tables, best practices, and more. This Second Edition features clearer diagrams as well as refined explanations based on extensive expert feedback. Sample questions help you reinforce what you have learned and prepare smarter.
Numerous illustrated examples and tables are included to demonstrate concepts, frameworks and real-life scenarios. The book offers step-by-step guidance through each of CCSP’s domains, including best practices and techniques used by the world's most experienced practitioners. Developed by (ISC)², endorsed by the Cloud Security Alliance® (CSA) and compiled and reviewed by cloud security experts across the world, this book brings together a global, thorough perspective. The Official (ISC)² Guide to the CCSP CBK should be utilized as your fundamental study tool in preparation for the CCSP exam and provides a comprehensive reference that will serve you for years to come. |
|
|
 The Definitive Guide to db4oTo satisfy the demand for 24/7 information access, applications available in airport and conference kiosks, and in the mobile, gaming, and medical industries, provide consumers data access wherever they are. But it's essential that fast availability not be traded for quality performance.
A prominent solution for managing the data in... |  |  More About Software Requirements: Thorny Issues and Practical Advice
Providing answers to real questions from software developers and business analysts, this succinct guide describes practical techniques for gathering and managing software requirements that help you meet project specifications and customer expectations.
From the author of Software Requirements, Second Edition, this... |  |  Scalable VoIP Mobility: Integration and DeploymentToday's businesses, big and small, are faced with the large scale restructuring concerning daily communications. Enterprises are moving from the standard wired telephony to wired and wireless communication via internet protocol (IP), Wi-Fi, and cellular services. With the stabilization of these networks and the availability of dual-mode handsets... |
|