CISSP: Certified Information Systems Security Professional Study Guide

CISSP: Certified Information Systems Security Professional Study Guide
  • eBook:
    CISSP: Certified Information Systems Security Professional Study Guide
  • Author:
    James M. Stewart, Ed Tittel, Mike Chapple
  • Edition:
    5 edition
  • Categories:
  • Data:
    January 25, 2011
  • ISBN:
  • ISBN-13:
  • Language:
  • Pages:
    864 pages
  • Format:

Book Description
Totally updated for 2011, here's the ultimate study guide for the CISSP exam
Considered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive study guide covers every aspect of the 2011 exam and the latest revision of the CISSP body of knowledge. It offers advice on how to pass each section of the exam and features expanded coverage of biometrics, auditing and accountability, software security testing, and other key topics. Included is a CD with two full-length, 250-question sample exams to test your progress.
  • CISSP certification identifies the ultimate IT security professional; this complete study guide is fully updated to cover all the objectives of the 2011 CISSP exam
  • Provides in-depth knowledge of access control, application development security, business continuity and disaster recovery planning, cryptography, Information Security governance and risk management, operations security, physical (environmental) security, security architecture and design, and telecommunications and network security
  • Also covers legal and regulatory investigation and compliance
  • Includes two practice exams and challenging review questions on the CD
Professionals seeking the CISSP certification will boost their chances of success with CISSP: Certified Information Systems Security Professional Study Guide, 5th Edition.


Chapter 1: Accountability and Access Control
Chapter 2: Attacks and Monitoring
Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure
Chapter 4: Communications Security and Countermeasures
Chapter 5: Security Management Concepts and Principles
Chapter 6: Asset Value, Policies, and Roles
Chapter 7: Data and Application Security Issues
Chapter 8: Malicious Code and Application Attacks
Chapter 9: Cryptography and Symmetric Key Algorithms
Chapter 10: PKI and Cryptographic Applications
Chapter 11: Principles of Computer Design
Chapter 12: Principles of Security Models
Chapter 13: Administrative Management
Chapter 14: Auditing and Monitoring
Chapter 15: Business Continuity Planning
Chapter 16: Disaster Recovery Planning
Chapter 17: Law and Investigations
Chapter 18: Incidents and Ethics
Chapter 19: Physical Security Requirements

Free sample

Add comments
Введите код с картинки:*
Кликните на изображение чтобы обновить код, если он неразборчив
Copyright © 2019