Gift Guide

Official (ISC)2 Guide to the ISSAP CBK / Edition 1

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $16.08
Usually ships in 1-2 business days
(Save 80%)
Other sellers (Hardcover)
  • All (3) from $16.08   
  • New (1) from $72.88   
  • Used (2) from $16.08   
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any coupons and promotions
Seller since 2007

Feedback rating:



New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.


Ships from: Avenel, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Sort by


Candidates for the CISSP-ISSAP® professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP® CBK®, but also have the ability to apply this in-depth knowledge to develop a detailed security architecture that meets all requirements.

Supplying an authoritative review of the key concepts and requirements of the ISSAP® CBK®, the Official (ISC)2® Guide to the ISSAP® CBK® provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Requirements Analysis, Access Control, Cryptography, Physical Security, BCP/DRP, and Telecommunications and Network Security.

Endorsed by the (ISC)2®

Follows the newly revised CISSP-ISSAP® CBK®

Reflects the evolving terminology and changing requirements for security professionals

With chapters written by those shaping this relatively new and rapidly developing field, this book is the only officially endorsed guide to the CISSP-ISSAP® CBK®. Read it, study it, and refer to it often as it will help improve your chances of achieving certification the first time around. Following certification it will serve as an authoritative reference for constructing architectures that are compliant with the latest security requirements.

Read More Show Less

Editorial Reviews

From the Publisher
(ISC)2 is pleased to offer the first Official (ISC) Guide to the ISSAP® CBK®. This book will review and deepen your knowledge of security architecture, covering each of the six domains contained in the CISSP-ISSAP® CBK®.
W. Hord Tipton, CISSP-ISSAP, CAP, CISA, Executive Director (ISC)2®
Read More Show Less

Product Details

  • ISBN-13: 9781439800935
  • Publisher: Taylor & Francis
  • Publication date: 12/15/2010
  • Series: (ISC)2 Press Series
  • Edition number: 1
  • Pages: 521
  • Product dimensions: 6.40 (w) x 9.30 (h) x 1.20 (d)

Meet the Author

About the Authors:

Alex Golod, CISSP, is a senior security consultant with 29 years of experience for one of the Fortune 100 IT firms. He has focused the last 12 years of his career in information security. Alex’s many responsibilities include architecture, engineering, and operations of security solutions. His broad area of expertise covers application, network and data security, as well as risk analysis and mitigation.

Paul Baker, CPP, is a security manager with more than 30 years of extensive experience in all phases of law enforcement and industrial security. He holds a Doctorate in Strategic Leadership from Regent University, along with a Master of Science in Criminal Justice from Troy University, and is a Certified Protection Professional (CPP). Dr. Baker spent 6 years in the U.S. Marine Corps and has retired from the Maryland State Police. Dr. Baker is currently employed as a senior security manager for one of the top ten banks in the Washington, D.C, area. Dr. Baker is also an adjunct professor, teaching parttime for the University of Maryland University College in homeland security and for Southwestern College in security management.

Robert B. Batie, Jr., CISSP-ISSEP, ISSAP, ISSMP, CISM, CAP, has over 20 years of experience in communication security and information assurance. He is a senior principal systems engineer at Raytheon NCS, in St. Petersburg, FL. He is a Raytheon Author, Inventor and Technical Honoree, as well as a contributing author for the Official Guide to the CISSP-ISSEP CBK. He has published articles in the CSI Journal, Alert Newsletter and presented at Raytheon symposiums, the CSI Conferences, and the International Biometric Conference. He is an active member of (ISC)2.

Bob has a Master’s of Science in Computer Systems Management from the University of Maryland and is currently working on a Ph.D. at Nova Southeastern University.

Gilbert Held graduated from Pennsylvania Military College with a B.S. in electrical engineering; he also has earned an MSEE degree from New York University and an MSTM and M.B.A. from The American University. He spent 27 years in the U.S. Army and retired as a Lieutenant Colonel. Gil was the Chief of Data Communications for the U.S. Post Office of Personal Management for 20 years. He also designed, acquired, and constructed the OPM’s Web presence and received the Directors Award for his efforts.

Gil has written over 100 technical books that have exceeded over a million copies, over 500 technical articles on personal computing and data communications and business, and taught 14 different graduate level courses. He has also served as the Editor-in-Chief of the Wiley International journal of Network Management and was selected by the Vice President of the United States to represent the United States at the Jerusalem Conference on Information Technology.

Mark J. Makowski, CISSP-ISSAP, is a security architect who has worked in IT for more than 29 years. A graduate of Lawrence Technological University, Mark began his career as a field engineer at Burrough’s Corporation in the early 1980s. In the mid-1990s, Mark began engineering tools to help secure UNIX servers for EDS customers. Since then, Mark has been responsible for developing security architectures across a broad range of technologies and industries. Currently, he is helping engineer enterprise services security offerings at a technology company operating in more than 170 countries around the globe. Mark, a member of the Motor City Chapter of ISSA, lives in the Detroit area.

Kelley Okolita is a Principal Consultant and Director of Business Continuity and Disaster Recovery for Hanover Insurance in Rhode Island. She built a new contingency program that cost less than industry peers. Within the first year she also renegotiated a hostile vendor contract saving the firm $500,000 a year and reducing the recovery timeline by 80% for time sensitive applications and added business recovery capabilities.

Kelley has also held key roles in Fidelity Investments as Director of Risk Management, where she was responsible for the recovery and business contingency efforts for roughly one third of the business operations and previously as Director of Corporate Contingency Planning. While in this role, Kelley spent 9 weeks in New Jersey supporting the recovery efforts of Fidelity New York operations from the events of September 11th.

She joined Fidelity in 1976 and has more than 20 years of experience in disaster recovery and business contingency planning both from a data center perspective and the business perspective. Through the years she has supported a number of business recoveries, both large and small. Kelley is an MBCP (Master Business Continuity Planner) and is a member of the Board of Directors for Disaster Recovery Institute International.

Sean M. Price, CISA, CISSP, is an independent security consultant and researcher living in northern Virginia. Over the last 15 years he has specialized in designing and evaluating organizational information assurance programs and system security architectures. His research interests include access control, insider threat, information flows, and applications of artificial intelligence to information assurance problems.

Sean’s prior publications include book chapters for the Information Security Management Handbook series and the Official (ISC) 2Guide to the CISSP CBK. A number of his articles and papers have appeared in peer-reviewed journals and conferences proceedings. Industry publications include the IEEE Computer Magazine, ISSA Journal, IA newsletter, and ISACA J-Online. You can reach him at

Read More Show Less

Table of Contents

Foreword vii

ISSAP® Introduction ix

About the Authors xiii

1 Access Control Systems and Methodology Sean Price 1

2 Cryptography Alex Golod Mark J. Makowski 123

3 ISSAP® Physical Security Integration Dr. Paul Baker 221

4 Requirements Analysis and Security Standards/Guidelines Criteria Robert B. Batie, Jr. 291

5 Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) Kelley Okolia 357

6 Telecommunications and Network Security Gilbert Held 375

Questions and Answers 445

Index 475

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)