Appendix C Helpful Resources and Links
The following links were verified before the release of these materials. However, (ISC)2 cannot guarantee their accuracy after release. Please do further research as necessary.
- APEC Privacy Framework: http://www.apec.org/Groups/Committee-on-Trade-and-Investment/~/media/Files/Groups/ECSG/05_ecsg_privacyframewk.ashx
- Application-level Denial of Service Attacks and Defenses: https://media.blackhat.com/bh-dc-11/Sullivan/BlackHat_DC_2011_Sullivan_Application-Level_Denial_of_Service_Att_&_Def-wp.pdf
- Basel Accord II: http://www.bis.org/publ/bcbs128.pdf
- Behavior Change When Working with Pass-Through Disks in Windows Server 2012 Failover Clusters: http://blogs.technet.com/b/askcore/archive/2013/01/24/behavior-change-when-working-with-pass-through-disks-in-windows-server-2012-failover-clusters.aspx ...
Get The Official (ISC)2 Guide to the CCSP CBK now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.