- Shopping Bag ( 0 items )
Clear and concise information ...
Clear and concise information on critical security technologies and topics
Practical examples and insights drawn from real-world experience
Leading-edge exam preparation software, including a testing engine and electronic flashcards for your Palm
You'll find authoritative coverage of key exam topics including:
Access Control Systems & Methodology
Applications & Systems Development
Business Continuity Planning
Law, Investigation & Ethics
Security Architecture & Models
Security Management Practices
Telecommunications, Network & Internet Security
Featured on the CD
SYBEX TEST ENGINE
Test your knowledge with advanced testing software. Includes chapter review questions and bonus exams!
Reinforce your understanding with flashcards that can run off your PC, Pocket PC, or Palm handheld.
Also on the CD, you’ll find the entire book in searchable and printable PDF.
About the Authors
Ed Tittel, CISSP, is the president and founder of LANWrights, Inc., and has been writing computer books since 1987. James Michael Stewart, CISSP, is a full-time writer, trainer, and researcher for LANWrights, Inc. He has written articles for numerous publications, including C|Net, InfoWorld, and Windows NT Magazine. Mike Chapple, CISSP, formerly an information security researcher with the National Security Agency, currently serves as Chief Information Officer of the Brand Institute, a Miami-based marketing consultancy.
|Ch. 1||Accountability and access control||1|
|Ch. 2||Attacks and monitoring||31|
|Ch. 3||ISO model, network security, and protocols||55|
|Ch. 4||Communications security and countermeasures||99|
|Ch. 5||Security management concepts and principles||129|
|Ch. 6||Asset value, policies, and roles||149|
|Ch. 7||Data and application security issues||179|
|Ch. 8||Malicious code and application attacks||219|
|Ch. 9||Cryptography and private key algorithms||253|
|Ch. 10||PKI and cryptographic applications||287|
|Ch. 11||Principles of computer design||317|
|Ch. 12||Principles of security models||361|
|Ch. 13||Administrative management||395|
|Ch. 14||Auditing and monitoring||421|
|Ch. 15||Business continuity planning||449|
|Ch. 16||Disaster recovery planning||475|
|Ch. 17||Law and investigations||507|
|Ch. 18||Incidents and ethics||541|
|Ch. 19||Physical security requirements||563|
Posted June 30, 2003
After having read several other CISSP prep books I found this the best one yet. It helped me through some of the domains I wasn't that familiar with eventhough I have been in IT for quite some time. Overall I would say you can not go wrong buying this book eventhough it is not the cure that fits all. You still need to crossreference in certain cases and it does not do any harm to also read other books or whitepapers about the different domains.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.