CISSP: Certified Information Systems Security Professional Study Guide / Edition 4

CISSP: Certified Information Systems Security Professional Study Guide / Edition 4

by James M. Stewart, Ed Tittel, Mike Chapple
     
 

ISBN-10: 0470276886

ISBN-13: 9780470276884

Pub. Date: 07/08/2008

Publisher: Wiley

Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% coverage of the CISSP Body of Knowledge exam objectives. Find clear and concise information on crucial security topics, practical examples and insights drawn from real-world experience, and cutting-edge

Overview

Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% coverage of the CISSP Body of Knowledge exam objectives. Find clear and concise information on crucial security topics, practical examples and insights drawn from real-world experience, and cutting-edge exam preparation software, including two full-length bonus exams and electronic flashcards. Prepare yourself by reviewing the key exam topics, including access control, application security, business continuity and disaster recovery planning, cryptography; information security and risk management, and security architecture and design telecommunications and network security.

Product Details

ISBN-13:
9780470276884
Publisher:
Wiley
Publication date:
07/08/2008
Edition description:
Study Guid
Pages:
888
Product dimensions:
7.40(w) x 9.10(h) x 2.00(d)

Related Subjects

Table of Contents

Introduction.

Assessment Test.

Chapter 1: Accountability and Access Control.

Chapter 2: Attacks and Monitoring.

Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure.

Chapter 4: Communications Security and Countermeasures.

Chapter 5: Security Management Concepts and Principles.

Chapter 6: Asset Value, Policies, and Roles.

Chapter 7: Data and Application Security Issues.

Chapter 8: Malicious Code and Application Attacks.

Chapter 9: Cryptography and Private Key Algorithms.

Chapter 10: PKI and Cryptographic Applications.

Chapter 11: Principles of Computer Design.

Chapter 12: Principles of Security Models.

Chapter 13: Administrative Management.

Chapter 14: Auditing and Monitoring.

Chapter 15: Business Continuity Planning.

Chapter 16: Disaster Recovery Planning.

Chapter 17: Law and Investigations.

Chapter 18: Incidents and Ethics.

Chapter 19: Physical Security Requirements.

Appendix: About the Companion CD.

Glossary.

Index.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >