The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide こちらもおすすめ

IT Governance IT Governance
2019年
Security Management of Next Generation Telecommunications Networks and Services Security Management of Next Generation Telecommunications Networks and Services
2013年
Official (ISC)2 Guide to the CISSP - ISSMP CBK, Second Edition Official (ISC)2 Guide to the CISSP - ISSMP CBK, Second Edition
2014年
ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard
2022年
Official (ISC)2® Guide to the ISSAP® CBK Official (ISC)2® Guide to the ISSAP® CBK
2017年
Assuring Information Security Assuring Information Security
2012年
Information Security Management Handbook Information Security Management Handbook
2019年
The Official (ISC)2 CISSP CBK Reference The Official (ISC)2 CISSP CBK Reference
2021年
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
2014年
Information Security Management Handbook, Volume 6 Information Security Management Handbook, Volume 6
2016年
Building a PCI DSS Information Security Program Building a PCI DSS Information Security Program
2016年
A Practical Guide to Cybersecurity in SAP A Practical Guide to Cybersecurity in SAP
2021年
Official (ISC)2 Guide to the ISSAP CBK, Second Edition Official (ISC)2 Guide to the ISSAP CBK, Second Edition
2013年
Official (ISC)2 Guide to the CISSP CBK Official (ISC)2 Guide to the CISSP CBK
2015年
EU Code of Conduct for Cloud Service Providers EU Code of Conduct for Cloud Service Providers
2021年