9780072193534

CISSP Certification: All-in-One Exam Guide. Text with CD-Rom for Macintosh and Windows

by
  • ISBN13:

    9780072193534

  • ISBN10:

    0072193530

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 12/26/2001
  • Publisher: Osborne/Mcgraw-Hill
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $79.99

Summary

Get complete, up-to-date coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam inside this all-inclusive resource. With full treatment of all the 10 exam domains, as developed by the International Information Systems Security Certification Consortium (ISC)[superscript 2], this definitive tool contains learning objectives at the beginning of each chapter, sidebars with in-depth technical explanations, practice questions, and real-world scenarios. Detailed and authoritative, this dualpurpose volume serves as both a comprehensive certification study guide and a fundamental on-the-job reference. Book jacket.

Author Biography

Shon Harris, CISSP, MCSE, is the president of Logical Security, a security consultant, and a former engineer in the Air Force's Information Warfare unit

Table of Contents

Chapter 1: Reasons to Become a CISSP

Chapter 2: Security Trends

Chapter 3: Security Management Practices

Chapter 4: Access Control

Chapter 5: Security Models and Architecture

Chapter 6: Physical Security

Chapter 7: Telecommunications and Networking Security

Chapter 8: Cryptography

Chapter 9: Disaster Recovery and Business Continuity

Chapter 10: Law, Investigation, and Ethics

Chapter 11: Application and System Development

Chapter 12: Operations Security

Appendix A: Security Policies

Appendix B: British Standard 7799

Appendix C: Who’s Who?

Appendix D: Gramm Leach Bliley Act

Appendix E: Various Networking Components

Appendix F: Why Many Security Implementations Die in Motivation and End Up Half Baked

Appendix G: Your Company’s Rights versus Your Employees’ RightsRights

Rewards Program

Write a Review