Official (ISC)2 Guide to the CISSP ExamCRC Press, 2003. dec. 15. - 902 oldal Candidates for the CISSP exam can now go directly to the source for study materials that are indispensable in achieving certification. The Official (ISC)2 Guide to the CISSP Exam is derived from the actual CBK review course created and administered by the non-profit security consortium (ISC)2. In addition to being an invaluable study guide, this book is detailed enough to serve as an authoritative information security resource. Both of the guide's co-authors are CISSPs, and the entire text has been reviewed and approved by Hal Tipton, Co-Founder and Past President of ISSA and Co-Founder of (ISC)2. The ten subject areas included, each a section from the Common Body of Knowledge (CBK), have been reviewed by multiple CISSPs, all of whom are recognized leaders in their fields. A CISSP certification garners significant respect, signifying that the recipient has demonstrated a higher standard of knowledge, proficiency, and ethics. This book ensures that a student is fully prepared to face the exam's rigorous criteria. It is crafted to match the overall theme of the exam, which emphasizes a general, solutions-oriented knowledge of security that organizations want. |
Tartalomjegyzék
Chapter 1 Information Security Management | 1 |
Chapter 2 Security Architecutre and Models | 79 |
Chapter 3 Access Control Systems and Methodology | 147 |
Chapter 4 Applications and Systems Development | 225 |
Chapter 5 Operations Security | 325 |
Chapter 6 Cryptography | 377 |
Chapter 7 Physical Security | 449 |
Chapter 8 Telecommunications Network and Internet Security | 515 |
Más kiadások - Összes megtekintése
Official (ISC)2 Guide to the CISSP Exam Susan Hansche, CISSP,John Berti, CISSP,Chris Hare Korlátozott előnézet - 2003 |
Official (ISC)2 Guide to the CISSP Exam Susan Hansche, CISSP,John Berti, CISSP,Chris Hare Nincs elérhető előnézet - 2003 |
Gyakori szavak és kifejezések
access control activities addition administrator allow analysis Answer application attack audit authentication authorized called changes CISSP communications connection considered contains create critical database Define Describe detection determine devices document effective employees encryption ensure environment equipment established evidence example executed Exhibit functions hardware identify implemented important incident individual Information Security installed integrity Internet involves issues layer lock means mechanisms memory method monitor object occur operating system organization packet password perform person physical possible prevent privileges problem procedures protection protocol received record recovery referred remote request requirements response result risk sensitive server specific standard storage stored threats tion unauthorized usually vulnerabilities
Hivatkozások erre a könyvre
Managing Information Assurance in Financial Services Rao, H.R.,Gupta, Manish,Upadhyaya, Shambhu J. Nincs elérhető előnézet - 2007 |
Managing Information Assurance in Financial Services Rao, H.R.,Gupta, Manish,Upadhyaya, Shambhu J. Nincs elérhető előnézet - 2007 |