CART

(0) items

CISSP Certification: All-in-One Exam Guide. Text with CD-Rom for Macintosh and Windows,9780072193534
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

CISSP Certification: All-in-One Exam Guide. Text with CD-Rom for Macintosh and Windows

by
Edition:
1st
ISBN13:

9780072193534

ISBN10:
0072193530
Format:
Hardcover
Pub. Date:
12/26/2001
Publisher(s):
Osborne/Mcgraw-Hill
List Price: $79.99
More New and Used
from Private Sellers
Starting at $0.01

Rent Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

New Book

We're Sorry
Sold Out

Related Products


  • CISSP All-in-One Exam Guide, Second Edition
    CISSP All-in-One Exam Guide, Second Edition
  • CISSP Certification All-in-One Exam Guide, Fourth Edition
    CISSP Certification All-in-One Exam Guide, Fourth Edition




Summary

Get complete, up-to-date coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam inside this all-inclusive resource. With full treatment of all the 10 exam domains, as developed by the International Information Systems Security Certification Consortium (ISC)[superscript 2], this definitive tool contains learning objectives at the beginning of each chapter, sidebars with in-depth technical explanations, practice questions, and real-world scenarios. Detailed and authoritative, this dualpurpose volume serves as both a comprehensive certification study guide and a fundamental on-the-job reference. Book jacket.

Author Biography

Shon Harris, CISSP, MCSE, is the president of Logical Security, a security consultant, and a former engineer in the Air Force's Information Warfare unit

Table of Contents

Chapter 1: Reasons to Become a CISSP

Chapter 2: Security Trends

Chapter 3: Security Management Practices

Chapter 4: Access Control

Chapter 5: Security Models and Architecture

Chapter 6: Physical Security

Chapter 7: Telecommunications and Networking Security

Chapter 8: Cryptography

Chapter 9: Disaster Recovery and Business Continuity

Chapter 10: Law, Investigation, and Ethics

Chapter 11: Application and System Development

Chapter 12: Operations Security

Appendix A: Security Policies

Appendix B: British Standard 7799

Appendix C: Who’s Who?

Appendix D: Gramm Leach Bliley Act

Appendix E: Various Networking Components

Appendix F: Why Many Security Implementations Die in Motivation and End Up Half Baked

Appendix G: Your Company’s Rights versus Your Employees’ RightsRights



Please wait while the item is added to your cart...