CISSP: Certified Information Systems Security Professional Study Guide

Przednia okładka
John Wiley & Sons, 13 gru 2005 - 800
CISSP Certified Information Systems Security Professional Study Guide

Here's the book you need to prepare for the challenging CISSP exam from (ISC)¯2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in the field of IT security. In addition to the consistent and accessible instructional approach that readers have come to expect from Sybex, this book provides:

  • Clear and concise information on critical security technologies and topics
  • Practical examples and insights drawn from real-world experience
  • Expanded coverage of key topics such as biometrics, auditing and accountability, and software security testing
  • Leading-edge exam preparation software, including a testing engine and electronic flashcards for your PC, Pocket PC, and Palm handheld

You'll find authoritative coverage of key exam topics including:

  • Access Control Systems & Methodology
  • Applications & Systems Development
  • Business Continuity Planning
  • Cryptography
  • Law, Investigation, & Ethics
  • Operations Security & Physical Security
  • Security Architecture, Models, and Management Practices
  • Telecommunications, Network, & Internet Security
 

Co mówią ludzie - Napisz recenzję

Nie znaleziono żadnych recenzji w standardowych lokalizacjach.

Spis treści

Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 1 Accountability and Access Control
1
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 2 Attacks and Monitoring
43
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 3 ISO Model Network Security and Protocols
69
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 4 Communications Security and Countermeasures
121
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 5 Security Management Concepts and Principles
153
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 6 Asset Value Policies and Roles
175
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 7 Data and Application Security Issues
209
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 8 Malicious Code and Application Attacks
257
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 12 Principles of Security Models
415
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 13 Administrative Management
449
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 14 Auditing and Monitoring
477
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 15 Business Continuity Planning
509
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 16 Disaster Recovery Planning
535
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 17 Law and Investigations
571
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 18 Incidents and Ethics
605
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 19 Physical Security Requirements
627

Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 9 Cryptography and Private Key Algorithms
293
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 10 PKI and Cryptographic Applications
335
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 11 Principles of Computer Design
369
Certified Information Systems Security Professional Study Guide 3rd Edition Glossary
659
Certified Information Systems Security Professional Study Guide 3rd Edition Index
725
Prawa autorskie

Inne wydania - Wyświetl wszystko

Kluczowe wyrazy i wyrażenia

Informacje o autorze (2005)

James Michael Stewart, CISSP, is a security expert who has authored numerous publications, books, and courseware.

Ed Tittel, CISSP, is a freelance writer and a regular contributor to numerous publications, including C|Net, InfoWorld, and Windows IT Pro. Ed has authored over 130 books.

Mike Chapple, CISSP, is an IT security professional with the University of Notre Dame.

Informacje bibliograficzne