CISSP : Certified Information Systems Security Professional study guide
Author(s)
Bibliographic Information
CISSP : Certified Information Systems Security Professional study guide
SYBEX, c2004
2nd ed, rev. and updated ed
- Other Title
-
Certified Information Systems Security Professional
Available at / 1 libraries
-
No Libraries matched.
- Remove all filters.
Note
Previous ed.: 2003
Includes index
Description and Table of Contents
Description
Here's the book you need to prepare for the challenging CISSP exam from (ISC) ~ 2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned Sybex the "Best Study Guide" designation in the 2003 CertCities Readers Choice Awards, this book provides: clear and concise information on critical security technologies and topics; practical examples and insights drawn from real-world experience; leading-edge exam preparation software, including a testing engine and electronic flashcards for your Palm. You'll find authoritative coverage of key exam topics including: access control systems and methodology applications and systems development business continuity planning cryptography law, investigation & ethics operations security physical security security architecture and models security management practices telecommunications, network and internet security.
Table of Contents
Introduction. Assessment Test. Chapter 1 Accountability and Access Control. Chapter 2 Attacks and Monitoring. Chapter 3 ISO Model, Network Security, and Protocols. Chapter 4 Communications Security and Countermeasures. Chapter 5 Security Management Concepts and Principles. Chapter 6 Asset Value, Policies, and Roles. Chapter 7 Data and Application Security Issues. Chapter 8 Malicious Code and Application Attacks. Chapter 9 Cryptography and Private Key Algorithms. Chapter 10 PKI and Cryptographic Applications. Chapter 11 Principles of Computer Design. Chapter 12 Principles of Security Models. Chapter 13 Administrative Management. Chapter 14 Auditing and Monitoring. Chapter 15 Business Continuity Planning. Chapter 16 Disaster Recovery Planning. Chapter 17 Law and Investigations. Chapter 18 Incidents and Ethics. Chapter 19 Physical Security Requirements. Glossary. Index.
by "Nielsen BookData"