Here’s the book you need to prepare for the challenging CISSP examfrom (ISC)-2. This revised edition was developed to meet theexacting requirements of today’s security certification candidates.In addition to the consistent and accessible instructional approachthat earned Sybex the ‘Best Study Guide’ designation in the 2003Cert Cities Readers Choice Awards, this book provides:* Clear and concise information on critical security technologiesand topics* Practical examples and insights drawn from real-worldexperience* Leading-edge exam preparation software, including a testingengine and electronic flashcards for your Palm You’ll find authoritative coverage of key exam topicsincluding:* Access Control Systems & Methodology* Applications & Systems Development* Business Continuity Planning* Cryptography* Law, Investigation & Ethics* Operations Security* Physical Security* Security Architecture & Models* Security Management Practices* Telecommunications, Network & Internet Security Note:CD-ROM/DVD and other supplementarymaterials are not included as part of e Book file.
Daftar Isi
Introduction.Assessment Test.Chapter 1 Accountability and Access Control.Chapter 2 Attacks and Monitoring.Chapter 3 ISO Model, Network Security, and Protocols.Chapter 4 Communications Security and Countermeasures.Chapter 5 Security Management Concepts and Principles.Chapter 6 Asset Value, Policies, and Roles.Chapter 7 Data and Application Security Issues.Chapter 8 Malicious Code and Application Attacks.Chapter 9 Cryptography and Private Key Algorithms.Chapter 10 PKI and Cryptographic Applications.Chapter 11 Principles of Computer Design.Chapter 12 Principles of Security Models.Chapter 13 Administrative Management.Chapter 14 Auditing and Monitoring.Chapter 15 Business Continuity Planning.Chapter 16 Disaster Recovery Planning.Chapter 17 Law and Investigations.Chapter 18 Incidents and Ethics.Chapter 19 Physical Security Requirements.Glossary.Index.
Tentang Penulis
Ed Tittel, CISSP, is the president and founder of LANWrights, Inc., and has been writing computer books since 1987.James Michael Stewart, CISSP, is a full-time writer, trainer, and researcher for LANWrights, Inc. He has writtenarticles for numerous publications, including C|Net, Info World, and Windows NT Magazine.Mike Chapple, CISSP, formerly an information securityresearcher with the National Security Agency, currently serves as Chief Information Officer of the Brand Institute, a Miami-basedmarketing consultancy.