did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470944981

CISSP: Certified Information Systems Security Professional Study Guide, 5th Edition

by ; ;
  • ISBN13:

    9780470944981

  • ISBN10:

    0470944986

  • Edition: 5th
  • Format: Paperback
  • Copyright: 2011-01-01
  • Publisher: Sybex
  • Purchase Benefits
List Price: $59.99

Summary

This comprehensive book will guide readers through CISSP exam topics, including: Access Control Application Development Security Business Continuity and Disaster Recovery Planning Cryptography Information Security Governance and Risk Management Legal, Regulations, Investigations and Compliance Operations Security Physical (Environmental) Security Security Architecture and Design Telecommunications and Network SecurityThis study guide will be complete with 100% coverage of the exam objectives, real world scenarios, hands-on exercises, and challenging review questions, both in the book and on the CD.

Author Biography

James Michael Stewart, CISSP, is a security expert, technical trainer, and author who has written numerous publications, books, and courseware. Ed Tittel, CISSP, is a freelance writer and a regular contributor to numerous online outlets, including SearchSecurity.com, InformIT.com, and ITExpertVoice.com. He has authored over 140 books. Mike Chapple, PhD, CISSP, is an IT security professional with the University of Notre Dame. He was formerly chief information officer of Brand Institute and an information security researcher with the National Security Agency and the U.S. Air Force.

Table of Contents

Introduction.

1 Accountability and Access Control.

2 Attacks and Monitoring.

3 ISO Model, Protocols, Network Security, and Network Infrastructure.

4 Communications Security and Countermeasures.

5 Security Management Concepts and Principles.

6 Asset Value, Policies, and Roles.

7 Data and Application Security Issues.

8 Malicious Code and Application Attacks.

9 Cryptography and Private Key Algorithms.

10 PKI and Cryptographic Applications.

11 Principles of Computer Design.

12 Principles of Security Models.

13 Administrative Management.

14 Auditing and Monitoring.

15 Business Continuity Planning.

16 Disaster Recovery Planning.

17 Law and Investigations.

18 Incidents and Ethics.

19 Physical Security Requirements.

Appendix About the Companion CD.

Index.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program