Synopses & Reviews
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned Sybex the "Best Study Guide" designation in the 2003 CertCities Readers Choice Awards, this book provides:
Clear and concise information on critical security technologies and topics
Practical examples and insights drawn from real-world experience
Leading-edge exam preparation software, including a testing engine and electronic flashcards for your Palm.
You'll find authoritative coverage of key exam topics including:
- Access Control Systems & Methodology
- Applications & Systems Development
- Business Continuity Planning
- Cryptography
- Law, Investigation & Ethics
- Operations Security
- Physical Security
- Security Architecture & Models
- Security Management Practices
- Telecommunications, Network & Internet Security
Featured on the CD
SYBEX TEST ENGINE
Test your knowledge with advanced testing software. Includes chapter review questions and bonus exams!
ELECTRONIC FLASHCARDS
Reinforce your understanding with flashcards that can run off your PC, Pocket PC, or Palm handheld.
Also on the CD, you’ll find the entire book in searchable and printable PDF.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Synopsis
Components CD includes advanced testing engine with hundreds of sample exam questions, electronic flashcards, and the entire book in PDF.
About the Author
Ed Tittel, CISSP, is the president and founder of LANWrights, Inc., and has been writing computer books since 1987.
James Michael Stewart, CISSP, is a full-time writer, trainer, and researcher for LANWrights, Inc. He has written articles for numerous publications, including C|Net, InfoWorld, and Windows NT Magazine.
Mike Chapple, CISSP, formerly an information security researcher with the National Security Agency, currently serves as Chief Information Officer of the Brand Institute, a Miami-based marketing consultancy.
Table of Contents
Chapter 1: Accountability and access control.
Chapter 2: Attacks and monitoring.
Chapter 3: ISO model, network security, and protocols.
Chapter 4: Communications security and countermeasures.
Chapter 5: Security management concepts and principles.
Chapter 6: Asset value, policies, and roles.
Chapter 7: Data and application security issues.
Chapter 8: Malicious code and application attacks.
Chapter 9: Cryptography and private key algorithms.
Chapter 10: PKI and cryptographic applications.
Chapter 11: Principles of computer design.
Chapter 12: Principles of security models.
Chapter 13: Administrative management.
Chapter 14: Auditing and monitoring.
Chapter 15: Business continuity planning.
Chapter 16: Disaster recovery planning.
Chapter 17: Law and investigations.
Chapter 18: Incidents and ethics.
Chapter 19: Physical security requirements.