CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001

CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
分享
扫描下方二维码分享到微信
打开微信,点击右上角”+“,
使用”扫一扫“即可将网页分享到朋友圈。
作者:
出版社: Wiley
2012-02
版次: 1
ISBN: 9781118083192
定价: 605.50
装帧: 平装
开本: 其他
纸张: 其他
页数: 552页
正文语种: 英语
  • GetPreparedforCompTIAAdvancedSecurityPractitioner(CASP)ExamTargetingsecurityprofessionalswhoeitherhavetheirCompTIASecurity+certificationorarelookingtoachieveamoreadvancedsecuritycertification,thisCompTIAAuthorizedstudyguideisfocusedonthenewCompTIAAdvancedSecurityPractitioner(CASP)ExamCAS–001.VeteranITsecurityexpertandauthorMichaelGreggdetailsthetechnicalknowledgeandskillsyouneedtoconceptualize,design,andengineersecuresolutionsacrosscomplexenterpriseenvironments.Hepreparesyouforaspectsofthecertificationtestthatassesshowwellyouapplycriticalthinkingandjudgmentacrossabroadspectrumofsecuritydisciplines.Featuringclearandconciseinformationoncrucialsecuritytopics,thisstudyguideincludesexamplesandinsightsdrawnfromreal–worldexperiencetohelpyounotonlypreparefortheexam,butalsoyourcareer.Youwillgetcompletecoverageofexamobjectivesforalltopicareasincluding:SecuringEnterprise–levelInfrastructuresConductingRiskManagementAssessment?ImplementingSecurityPoliciesandProceduresResearchingandAnalyzingIndustryTrendsIntegratingComputing,CommunicationsandBusinessDisciplinesAdditionally,youcandownloadasuiteofstudytoolstohelpyouprepareincludinganassessmenttest,twopracticeexams,electronicflashcards,andaglossaryofkeyterms.Gotowww.sybex.com/go/caspanddownloadthefullsetofelectronictestpreptools. MichaelGreggistheCOOofSuperiorSolutions,Inc.(www.thesolutionfirm.com),aHouston-basedconsultingfirmthatperformssecurityassessmentsandpenetrationtestingforFortune1000companies.Heisanexpertonsecurity,networking,andInternettechnologies,andhaswrittenover14booksonITsecurity.Michaelholdsthefollowingcertifications:CISSP,CISA,CISM,MCSE,MCT,CTT+,A+,Network+,Security+,CNA,CCNA,CIWSecurityAnalyst,CCE,CEH,CHFI,CEI,DCNP,ESDragonIDS,ESAdvancedDragonIDS,andSSCP.BillyHaines,CCNASecurity,CISSPAssociate,isasystemsengineerforascience,engineering,technology,andapplicationscompanyinthegreaterSanDiegoarea.Priortothat,hewasanetworksecurityvulnerabilitytechnicianwiththeU.S.Navy,specializinginadvancednetworking,intrusiondetection,vulnerabilitymanagement,informationassurance,andcomprehensivedefense-in-depthimplementation. ForewordxxiIntroductionxxviiAssessmentTestxlivChapter1CryptographicToolsandTechniques1TheHistoryofCryptography2CryptographicServices3CryptographicGoals3CryptographicTerms4CipherTypesandMethods6SymmetricEncryption8DataEncryptionStandard10Triple-DES11AdvancedEncryptionStandard12InternationalDataEncryptionAlgorithm12RivestCipherAlgorithms13AsymmetricEncryption13DiffieHellman14RSA15EllipticCurveCryptography16ElGamal16MerkleHellmanKnapsack16HybridEncryption16Hashing17HashingandMessageDigests17MDSeries19SHA19HAVAL19MessageAuthenticationCode20HMAC20DigitalSignatures20PublicKeyInfrastructure22CertificateAuthority22RegistrationAuthority23CertificateRevocationList23DigitalCertificates24CertificateDistribution26TheClientsRoleinPKI26CryptographicSolutions27ApplicationLayerEncryption27TransportLayerEncryption28InternetLayerControls28PhysicalLayerControls29CryptographicAttacks30Summary31ExamEssentials31ReviewQuestions33Chapter2ComprehensiveSecuritySolutions37AdvancedNetworkDesign39RemoteAccess40PlacementofSecurityDevices41SCADA44VoIP45TCP/IP47NetworkInterfaceLayer48InternetLayer50TransportLayer55ApplicationLayer57SecureCommunicationSolutions60SecureFacilitySolutions66BuildingLayouts66FacilitiesManagement67SecureNetworkInfrastructureDesign67RouterConfiguration68EnterpriseServiceBus69WebServicesSecurity70Summary70ExamEssentials71ReviewQuestions73Chapter3SecuringVirtualized,Distributed,andSharedComputing77EnterpriseSecurity79CloudComputing81CloudComputingModels82CloudComputingProviders83BenefitsofCloudComputing83SecurityofCloudComputing86CloudComputingVulnerabilities90Virtualization92VirtualizedServers93VirtualLANs97EnterpriseStorage98Summary103ExamEssentials103ReviewQuestions105Chapter4HostSecurity109FirewallsandAccessControlLists110Host-BasedFirewalls114TrustedOperatingSystem117EndpointSecuritySoftware121Anti-malware124Antivirus124Anti-spyware126SpamFilters128HostHardening129AssetManagement133DataExfiltration134IntrusionDetectionandPrevention135Summary139ExamEssentials139ReviewQuestions141Chapter5ApplicationSecurityandPenetrationTesting145ApplicationSecurity147SpecificApplicationIssues149Cross-SiteScripting150Clickjacking151SessionManagement151InputValidation152SQLInjection153ApplicationSandboxing154ApplicationSecurityFramework154StandardLibraries155SecureCodingStandards156ApplicationExploits157EscalationofPrivilege158ImproperStorageofSensitiveData159CookieStorageandTransmission159ProcessHandlingattheClientandServer160Ajax161JavaScript161BufferOverflow162MemoryLeaks163IntegerOverflow163RaceConditions(TOC/TOU)163ResourceExhaustion164SecurityAssessmentsandPenetrationTesting165TestMethods166PenetrationTestingSteps166AssessmentTypes167AssessmentAreas168SecurityAssessmentandPenetrationTestTools170Summary182ExamEssentials182ReviewQuestions184Chapter6RiskManagement189RiskTerminology191IdentifyingVulnerabilities192OperationalRisks195RiskinBusinessModels195RiskinExternalandInternalInfluences201RiskswithData204TheRiskAssessmentProcess210AssetIdentification210InformationClassification212RiskAssessment213RiskAnalysisOptions217ImplementingControls218ContinuousMonitoring219EnterpriseSecurityArchitectureFrameworks220BestPracticesforRiskAssessments220Summary221ExamEssentials222ReviewQuestions224Chapter7Policies,Procedures,andIncidentResponse229AHigh-LevelViewofDocumentation231ThePolicyDevelopmentProcess232PoliciesandProcedures233BusinessDocumentsUsedtoSupportSecurity237DocumentsandControlsUsedforSensitiveInformation239WhySecurity?240PersonallyIdentifiableInformationControls240DataBreach242PoliciesUsedtoManageEmployees243AuditingRequirementsandFrequency247TheIncidentResponseFramework248DigitalForensics250TheRoleofTrainingandEmployeeAwareness254Summary255ExamEssentials256ReviewQuestions258Chapter8SecurityResearchandAnalysis263AnalyzingIndustryTrendsandOutliningPotentialImpact266PerformingOngoingResearch266BestPractices270NewTechnologies273SituationalAwareness281ResearchSecurityImplicationsofNewBusinessTools290GlobalIAIndustryCommunity293ResearchSecurityRequirementsforContracts296CarryingOutRelevantAnalysistoSecuretheEnterprise298Benchmarking298PrototypingandTestingMultipleSolutions298Cost-BenefitAnalysis299AnalyzingandInterpretingTrendDatatoAnticipateCyberDefenseAids299ReviewingEffectivenessofExistingSecurity299ReverseEngineeringorDeconstructingExistingSolutions301AnalyzingSecuritySolutionstoEnsureTheyMeetBusinessNeeds301ConductingaLessonsLearned/After-ActionReview302UsingJudgmenttoSolveDifficultProblems303ConductingNetworkTrafficAnalysis303Summary304ExamEssentials305ReviewQuestions306Chapter9EnterpriseSecurityIntegration311IntegrateEnterpriseDisciplinestoAchieveSecureSolutions313TheRoleofGovernanceinAchievingEnterpriseSecurity315InterpretingSecurityRequirementsandGoalstoCommunicatewithOtherDisciplines317GuidancetoManagement320EstablishEffectiveCollaborationwithinTeamstoImplementSecureSolutions322Disciplines325ExplaintheSecurityImpactofInterorganizationalChange328SecurityConcernsofInterconnectingMultipleIndustries330DesignConsiderationsDuringMergers,Acquisitions,andDe-mergers331AssuringThird-PartyProductsOnlyIntroduceAcceptableRisk332NetworkSecureSegmentationandDelegation334IntegrationofProductsandServices336Summary337ExamEssentials338ReviewQuestions339Chapter10SecurityControlsforCommunicationandCollaboration343SelectingandDistinguishingtheAppropriateSecurityControls345UnifiedCommunicationSecurity345VoIPSecurity354VoIPImplementation356RemoteAccess357EnterpriseConfigurationManagementofMobileDevices358SecureExternalCommunications359SecureImplementationofCollaborationPlatforms360PrioritizingTrafficwithQoS362MobileDevices363AdvancedAuthenticationTools,Techniques,andConcepts365FederatedIdentityManagement365XACML366SOAP366SSO367ServiceProvisioningMarkupLanguage368Certificate-BasedAuthentication369CarryingOutSecurityActivitiesacrosstheTechnologyLifeCycle370End-to-EndSolutionOwnership370UnderstandingtheResultsofSolutionsinAdvance371SystemsDevelopmentLifeCycle373AddressingEmergingThreatsandSecurityTrends375ValidatingSystemDesigns376Summary378ExamEssentials378ReviewQuestions380AppendixACASPLabManual385WhatYoullNeed386LabA1:Download,Verify,andInstallaVirtualEnvironment389LabA2:ExploreYourVirtualNetwork392LabA3:PortScanning396LabA4:IntroductiontoaProtocolAnalyzer400LabA5:WebVulnerabilities406LabA6:IntroductiontotheNessusVulnerabilityScanner408LabA7:VerifyaBaselineSecurityConfiguration411LabA8:BasicIntroductiontoWindowsForensicTools413LabA9:IntroductiontoHelix421LabA10:IntroductiontoHashing425LabA11:FileEncryption428LabA12:CrackingEncryptedFiles429LabA13:IntrusionDetection431LabA14:AnIntroductiontoSignature-BasedScanning433LabA15:RootkitDetection437LabA16:ThreatModeling440LabA17:IntroductiontotheMetasploitFramework442LabA18:SocialEngineering445LabA19:Routing,Switching,andSecurity449LabA20:FurtherExploration460AppendixBAnswerstoReviewQuestions463Chapter1:CryptographicToolsandTechniques464Chapter2:ComprehensiveSecuritySolutions465Chapter3:SecuringVirtualized,Distributed,andSharedComputing466Chapter4:HostSecurity467Chapter5:ApplicationSecurityandPenetrationTesting468Chapter6:RiskManagement469Chapter7:Policies,Procedures,andIncidentResponse471Chapter8:SecurityResearchandAnalysis472Chapter9:EnterpriseSecurityIntegration473Chapter10:SecurityControlsforCommunicationandCollaboration474AppendixCAbouttheAdditionalStudyTools475AdditionalStudyTools476SybexTestEngine476ElectronicFlashcards476PDFofGlossaryofTerms476AdobeReader476SystemRequirements477UsingtheStudyTools477Troubleshooting477CustomerCare478Index479
  • 内容简介:
    GetPreparedforCompTIAAdvancedSecurityPractitioner(CASP)ExamTargetingsecurityprofessionalswhoeitherhavetheirCompTIASecurity+certificationorarelookingtoachieveamoreadvancedsecuritycertification,thisCompTIAAuthorizedstudyguideisfocusedonthenewCompTIAAdvancedSecurityPractitioner(CASP)ExamCAS–001.VeteranITsecurityexpertandauthorMichaelGreggdetailsthetechnicalknowledgeandskillsyouneedtoconceptualize,design,andengineersecuresolutionsacrosscomplexenterpriseenvironments.Hepreparesyouforaspectsofthecertificationtestthatassesshowwellyouapplycriticalthinkingandjudgmentacrossabroadspectrumofsecuritydisciplines.Featuringclearandconciseinformationoncrucialsecuritytopics,thisstudyguideincludesexamplesandinsightsdrawnfromreal–worldexperiencetohelpyounotonlypreparefortheexam,butalsoyourcareer.Youwillgetcompletecoverageofexamobjectivesforalltopicareasincluding:SecuringEnterprise–levelInfrastructuresConductingRiskManagementAssessment?ImplementingSecurityPoliciesandProceduresResearchingandAnalyzingIndustryTrendsIntegratingComputing,CommunicationsandBusinessDisciplinesAdditionally,youcandownloadasuiteofstudytoolstohelpyouprepareincludinganassessmenttest,twopracticeexams,electronicflashcards,andaglossaryofkeyterms.Gotowww.sybex.com/go/caspanddownloadthefullsetofelectronictestpreptools.
  • 作者简介:
    MichaelGreggistheCOOofSuperiorSolutions,Inc.(www.thesolutionfirm.com),aHouston-basedconsultingfirmthatperformssecurityassessmentsandpenetrationtestingforFortune1000companies.Heisanexpertonsecurity,networking,andInternettechnologies,andhaswrittenover14booksonITsecurity.Michaelholdsthefollowingcertifications:CISSP,CISA,CISM,MCSE,MCT,CTT+,A+,Network+,Security+,CNA,CCNA,CIWSecurityAnalyst,CCE,CEH,CHFI,CEI,DCNP,ESDragonIDS,ESAdvancedDragonIDS,andSSCP.BillyHaines,CCNASecurity,CISSPAssociate,isasystemsengineerforascience,engineering,technology,andapplicationscompanyinthegreaterSanDiegoarea.Priortothat,hewasanetworksecurityvulnerabilitytechnicianwiththeU.S.Navy,specializinginadvancednetworking,intrusiondetection,vulnerabilitymanagement,informationassurance,andcomprehensivedefense-in-depthimplementation.
  • 目录:
    ForewordxxiIntroductionxxviiAssessmentTestxlivChapter1CryptographicToolsandTechniques1TheHistoryofCryptography2CryptographicServices3CryptographicGoals3CryptographicTerms4CipherTypesandMethods6SymmetricEncryption8DataEncryptionStandard10Triple-DES11AdvancedEncryptionStandard12InternationalDataEncryptionAlgorithm12RivestCipherAlgorithms13AsymmetricEncryption13DiffieHellman14RSA15EllipticCurveCryptography16ElGamal16MerkleHellmanKnapsack16HybridEncryption16Hashing17HashingandMessageDigests17MDSeries19SHA19HAVAL19MessageAuthenticationCode20HMAC20DigitalSignatures20PublicKeyInfrastructure22CertificateAuthority22RegistrationAuthority23CertificateRevocationList23DigitalCertificates24CertificateDistribution26TheClientsRoleinPKI26CryptographicSolutions27ApplicationLayerEncryption27TransportLayerEncryption28InternetLayerControls28PhysicalLayerControls29CryptographicAttacks30Summary31ExamEssentials31ReviewQuestions33Chapter2ComprehensiveSecuritySolutions37AdvancedNetworkDesign39RemoteAccess40PlacementofSecurityDevices41SCADA44VoIP45TCP/IP47NetworkInterfaceLayer48InternetLayer50TransportLayer55ApplicationLayer57SecureCommunicationSolutions60SecureFacilitySolutions66BuildingLayouts66FacilitiesManagement67SecureNetworkInfrastructureDesign67RouterConfiguration68EnterpriseServiceBus69WebServicesSecurity70Summary70ExamEssentials71ReviewQuestions73Chapter3SecuringVirtualized,Distributed,andSharedComputing77EnterpriseSecurity79CloudComputing81CloudComputingModels82CloudComputingProviders83BenefitsofCloudComputing83SecurityofCloudComputing86CloudComputingVulnerabilities90Virtualization92VirtualizedServers93VirtualLANs97EnterpriseStorage98Summary103ExamEssentials103ReviewQuestions105Chapter4HostSecurity109FirewallsandAccessControlLists110Host-BasedFirewalls114TrustedOperatingSystem117EndpointSecuritySoftware121Anti-malware124Antivirus124Anti-spyware126SpamFilters128HostHardening129AssetManagement133DataExfiltration134IntrusionDetectionandPrevention135Summary139ExamEssentials139ReviewQuestions141Chapter5ApplicationSecurityandPenetrationTesting145ApplicationSecurity147SpecificApplicationIssues149Cross-SiteScripting150Clickjacking151SessionManagement151InputValidation152SQLInjection153ApplicationSandboxing154ApplicationSecurityFramework154StandardLibraries155SecureCodingStandards156ApplicationExploits157EscalationofPrivilege158ImproperStorageofSensitiveData159CookieStorageandTransmission159ProcessHandlingattheClientandServer160Ajax161JavaScript161BufferOverflow162MemoryLeaks163IntegerOverflow163RaceConditions(TOC/TOU)163ResourceExhaustion164SecurityAssessmentsandPenetrationTesting165TestMethods166PenetrationTestingSteps166AssessmentTypes167AssessmentAreas168SecurityAssessmentandPenetrationTestTools170Summary182ExamEssentials182ReviewQuestions184Chapter6RiskManagement189RiskTerminology191IdentifyingVulnerabilities192OperationalRisks195RiskinBusinessModels195RiskinExternalandInternalInfluences201RiskswithData204TheRiskAssessmentProcess210AssetIdentification210InformationClassification212RiskAssessment213RiskAnalysisOptions217ImplementingControls218ContinuousMonitoring219EnterpriseSecurityArchitectureFrameworks220BestPracticesforRiskAssessments220Summary221ExamEssentials222ReviewQuestions224Chapter7Policies,Procedures,andIncidentResponse229AHigh-LevelViewofDocumentation231ThePolicyDevelopmentProcess232PoliciesandProcedures233BusinessDocumentsUsedtoSupportSecurity237DocumentsandControlsUsedforSensitiveInformation239WhySecurity?240PersonallyIdentifiableInformationControls240DataBreach242PoliciesUsedtoManageEmployees243AuditingRequirementsandFrequency247TheIncidentResponseFramework248DigitalForensics250TheRoleofTrainingandEmployeeAwareness254Summary255ExamEssentials256ReviewQuestions258Chapter8SecurityResearchandAnalysis263AnalyzingIndustryTrendsandOutliningPotentialImpact266PerformingOngoingResearch266BestPractices270NewTechnologies273SituationalAwareness281ResearchSecurityImplicationsofNewBusinessTools290GlobalIAIndustryCommunity293ResearchSecurityRequirementsforContracts296CarryingOutRelevantAnalysistoSecuretheEnterprise298Benchmarking298PrototypingandTestingMultipleSolutions298Cost-BenefitAnalysis299AnalyzingandInterpretingTrendDatatoAnticipateCyberDefenseAids299ReviewingEffectivenessofExistingSecurity299ReverseEngineeringorDeconstructingExistingSolutions301AnalyzingSecuritySolutionstoEnsureTheyMeetBusinessNeeds301ConductingaLessonsLearned/After-ActionReview302UsingJudgmenttoSolveDifficultProblems303ConductingNetworkTrafficAnalysis303Summary304ExamEssentials305ReviewQuestions306Chapter9EnterpriseSecurityIntegration311IntegrateEnterpriseDisciplinestoAchieveSecureSolutions313TheRoleofGovernanceinAchievingEnterpriseSecurity315InterpretingSecurityRequirementsandGoalstoCommunicatewithOtherDisciplines317GuidancetoManagement320EstablishEffectiveCollaborationwithinTeamstoImplementSecureSolutions322Disciplines325ExplaintheSecurityImpactofInterorganizationalChange328SecurityConcernsofInterconnectingMultipleIndustries330DesignConsiderationsDuringMergers,Acquisitions,andDe-mergers331AssuringThird-PartyProductsOnlyIntroduceAcceptableRisk332NetworkSecureSegmentationandDelegation334IntegrationofProductsandServices336Summary337ExamEssentials338ReviewQuestions339Chapter10SecurityControlsforCommunicationandCollaboration343SelectingandDistinguishingtheAppropriateSecurityControls345UnifiedCommunicationSecurity345VoIPSecurity354VoIPImplementation356RemoteAccess357EnterpriseConfigurationManagementofMobileDevices358SecureExternalCommunications359SecureImplementationofCollaborationPlatforms360PrioritizingTrafficwithQoS362MobileDevices363AdvancedAuthenticationTools,Techniques,andConcepts365FederatedIdentityManagement365XACML366SOAP366SSO367ServiceProvisioningMarkupLanguage368Certificate-BasedAuthentication369CarryingOutSecurityActivitiesacrosstheTechnologyLifeCycle370End-to-EndSolutionOwnership370UnderstandingtheResultsofSolutionsinAdvance371SystemsDevelopmentLifeCycle373AddressingEmergingThreatsandSecurityTrends375ValidatingSystemDesigns376Summary378ExamEssentials378ReviewQuestions380AppendixACASPLabManual385WhatYoullNeed386LabA1:Download,Verify,andInstallaVirtualEnvironment389LabA2:ExploreYourVirtualNetwork392LabA3:PortScanning396LabA4:IntroductiontoaProtocolAnalyzer400LabA5:WebVulnerabilities406LabA6:IntroductiontotheNessusVulnerabilityScanner408LabA7:VerifyaBaselineSecurityConfiguration411LabA8:BasicIntroductiontoWindowsForensicTools413LabA9:IntroductiontoHelix421LabA10:IntroductiontoHashing425LabA11:FileEncryption428LabA12:CrackingEncryptedFiles429LabA13:IntrusionDetection431LabA14:AnIntroductiontoSignature-BasedScanning433LabA15:RootkitDetection437LabA16:ThreatModeling440LabA17:IntroductiontotheMetasploitFramework442LabA18:SocialEngineering445LabA19:Routing,Switching,andSecurity449LabA20:FurtherExploration460AppendixBAnswerstoReviewQuestions463Chapter1:CryptographicToolsandTechniques464Chapter2:ComprehensiveSecuritySolutions465Chapter3:SecuringVirtualized,Distributed,andSharedComputing466Chapter4:HostSecurity467Chapter5:ApplicationSecurityandPenetrationTesting468Chapter6:RiskManagement469Chapter7:Policies,Procedures,andIncidentResponse471Chapter8:SecurityResearchandAnalysis472Chapter9:EnterpriseSecurityIntegration473Chapter10:SecurityControlsforCommunicationandCollaboration474AppendixCAbouttheAdditionalStudyTools475AdditionalStudyTools476SybexTestEngine476ElectronicFlashcards476PDFofGlossaryofTerms476AdobeReader476SystemRequirements477UsingtheStudyTools477Troubleshooting477CustomerCare478Index479
查看详情
相关图书 / 更多
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
CASP CompTIA Advanced Security Practitioner Certification Study Guide (Exam CAS-001)
Wm. Arthur、Gregory、Dwayne Williams 著
您可能感兴趣 / 更多
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
PIC新版8位增强型单片机原理及应用
Microchip大学计划部
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
卢丹城的中魔(新史学译丛)
Michel de Certeau
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
男子汉的诗学(汉译人类学名著丛书)
Michael Herzfeld
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
你好,长安(英文)
Michael、A.Stone 著
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
第二语言需求分析(当代国外语言学与应用语言学文库)(升级版)
Michael H. Long
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
萨满教、殖民主义与野人:关于恐惧与治疗的研究(汉译人类学名著丛书)
Michael Taussig
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
量子计算与量子信息:10周年版
Michael A.Nielsen Isaac L.Chuang 著;孙晓明 尚云 李绿周 尹璋琦 魏朝晖 田国敬 译
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
女性与领导力
Michele A.Paludi 著;Florence L.Denmark、朱运致 译
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
智能型职业生涯
Michael B. Arthur
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
侧方入路微创脊柱外科学
Michael Y. Wang Andrew A. Sama Juan S. Uribe 主编
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
高性能Python第2版(影印版)
MichaGorelick 著
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001
微创脊柱畸形外科学
Michael Y. Wang 主编;晋大祥 郑召民 海涌 吕国华 主译