Synopses & Reviews
CISSP GUIDE TO SECURITY ESSENTIALS CISSP Guide to Security Essentials provides readers with the tools and resources they need to develop a thorough understanding of the entire CISSP Certification Body of Knowledge. Using a variety of pedagogical features including study questions, case projects, and exercises, this book clearly and pointedly explains security basics. Coverage begins with an overview of information and business security today, security laws, and then progresses through the ten CISSP domains, including topics such as access control, cryptography and security architecture and design. With the demand for security professionals at an all-time high, whether you are a security professional in need of a reference, an IT professional with your sights on the CISSP certification, on a course instructor, CISSP GUIDE TO SECURITY ESSENTIALS CISSP Guide to Security Essentials has arrived just in time.
About the Author
Peter Gregory, CISA, CISSP, DRCE has over 25 years of experience in virtually every role in Business IT departments, including work in government, banking, non-profit, telecommunications and on-demand software businesses. He is the author of twenty books on security and technology and has been a technical editor for twenty additional books on security and technology. Gregory is on the board of advisors and the lead instructor for the University of Washington certificate program in information security, and a lecturer at the NSA-certified University of Washington Certificate Program in Information Assurance and Cybersecurity. He is also on the Board of Directors for the Evergreen State Chapter of InfraGard, and the Executive Steering Board for the SecureWorld Expo Conference in Seattle. A founding member of the Pacific CISO Forum, Mr. Gregory is a graduate of the FBI Citizens' Academy and active in the FBI Citizens' Academy Alumni Association. Gregory studied electrical engineering and computer science at the University of Nevada, Reno, and is the manager of information security and risk management at Concur, a Redmond, WA based provider of on-demand Employee Spend Management services.
Table of Contents
1: Information Security and Risk Management. 2: Access controls. 3: Application Security. 4: Business Continuity and Disaster Recovery Planning. 5: Cryptography. 6: Legal, Regulations, Compliance and Investigations. 7: Operations Security. 8: Physical and Environmental Security. 9: Security Architecture and Design. 10: Telecommunications and Network Security.