E-Book, Englisch, 888 Seiten, E-Book
Stewart / Tittel / Chapple CISSP
5. Auflage 2011
ISBN: 978-1-118-02827-8
Verlag: John Wiley & Sons
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Certified Information Systems Security Professional Study Guide
E-Book, Englisch, 888 Seiten, E-Book
ISBN: 978-1-118-02827-8
Verlag: John Wiley & Sons
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Totally updated for 2011, here's the ultimate study guide forthe CISSP exam
Considered the most desired certification for IT securityprofessionals, the Certified Information Systems SecurityProfessional designation is also a career-booster. Thiscomprehensive study guide covers every aspect of the 2011 exam andthe latest revision of the CISSP body of knowledge. It offersadvice on how to pass each section of the exam and featuresexpanded coverage of biometrics, auditing and accountability,software security testing, and other key topics. Included is a CDwith two full-length, 250-question sample exams to test yourprogress.
* CISSP certification identifies the ultimate IT securityprofessional; this complete study guide is fully updated to coverall the objectives of the 2011 CISSP exam
* Provides in-depth knowledge of access control, applicationdevelopment security, business continuity and disaster recoveryplanning, cryptography, Information Security governance and riskmanagement, operations security, physical (environmental) security,security architecture and design, and telecommunications andnetwork security
* Also covers legal and regulatory investigation andcompliance
* Includes two practice exams and challenging review questions onthe CD
Professionals seeking the CISSP certification will boost theirchances of success with CISSP: Certified Information SystemsSecurity Professional Study Guide, 5th Edition.
Autoren/Hrsg.
Weitere Infos & Material
Introduction.
1 Accountability and Access Control.
2 Attacks and Monitoring.
3 ISO Model, Protocols, Network Security, and NetworkInfrastructure.
4 Communications Security and Countermeasures.
5 Security Management Concepts and Principles.
6 Asset Value, Policies, and Roles.
7 Data and Application Security Issues.
8 Malicious Code and Application Attacks.
9 Cryptography and Private Key Algorithms.
10 PKI and Cryptographic Applications.
11 Principles of Computer Design.
12 Principles of Security Models.
13 Administrative Management.
14 Auditing and Monitoring.
15 Business Continuity Planning.
16 Disaster Recovery Planning.
17 Law and Investigations.
18 Incidents and Ethics.
19 Physical Security Requirements.
Appendix About the Companion CD.
Index.