Home | Best Seller | FAQ | Contact Us
Browse
Art & Photography
Biographies & Autobiography
Body,Mind & Health
Business & Economics
Children's Book
Computers & Internet
Cooking
Crafts,Hobbies & Gardening
Entertainment
Family & Parenting
History
Horror
Literature & Fiction
Mystery & Detective
Nonfiction
Professional & Technology
Reference
Religion
Romance
Science
Science Fiction & Fantasy
Sports & Outdoors
Travel & Geography
   Book Info

enlarge picture

Official (ISC)2 Guide to the CISSP Exam  
Author: Susan Hansche, et al
ISBN: 084931707X
Format: Handover
Publish Date: June, 2005
 
     
     
   Book Review


From Book News, Inc.
This study guide describes the major concepts defined in each of the ten domains established by the certified information systems security professional (CISSP) common body of knowledge. Each chapter breaks down security requirements, the networks and systems most related to the domain, the various tools available to address the requirements in the environment, and the means of assuring that the requirements are being met. Topics include security models, distributed access control methods, DBMS architectures, key cryptography algorithms, intrusion detection systems, and data network components and technologies The CD-ROM contains sample questions.Copyright © 2004 Book News, Inc., Portland, OR


Book Description
Candidates for the CISSP exam can now go directly to the source for study materials that are indispensable in achieving certification. The Official (ISC)2 Guide to the CISSP Exam is derived from the actual CBK review course created and administered by the non-profit security consortium (ISC)2. In addition to being an invaluable study guide, this book is detailed enough to serve as an authoritative information security resource. Both of the guide's co-authors are CISSPs, and the entire text has been reviewed and approved by Hal Tipton, Co-Founder and Past President of ISSA and Co-Founder of (ISC)2. The ten subject areas included, each a section from the Common Body of Knowledge (CBK), have been reviewed by multiple CISSPs, all of whom are recognized leaders in their fields.A CISSP certification garners significant respect, signifying that the recipient has demonstrated a higher standard of knowledge, proficiency, and ethics. This book ensures that a student is fully prepared to face the exam's rigorous criteria. It is crafted to match the overall theme of the exam, which emphasizes a general, solutions-oriented knowledge of security that organizations want.


Book Info
Guide for individuals seeking the Certified Information Systems Security Professional (CISSP) credential. Covers ten subject areas mapped directly to each of the ten (ISC)2 CBK domains from which the CISSP exam is derived. DLC: Electronic data processing personnel--Certification.




Official (ISC)2 Guide to the CISSP Exam

FROM THE PUBLISHER

Candidates for the CISSP exam can now go directly to the source for study materials that are indispensable in achieving certification. The Official (ISC)2 Guide to the CISSP Exam is derived from the actual CBK review course created and administered by the non-profit security consortium (ISC)2. In addition to being an invaluable study guide, this book is detailed enough to serve as an authoritative information security resource. Both of the guide's co-authors are CISSPs, and the entire text has been reviewed and approved by Hal Tipton, Co-Founder and Past President of ISSA and Co-Founder of (ISC)2. The ten subject areas included, each a section from the Common Body of Knowledge (CBK), have been reviewed by multiple CISSPs, all of whom are recognized leaders in their fields.A CISSP certification garners significant respect, signifying that the recipient has demonstrated a higher standard of knowledge, proficiency, and ethics. This book ensures that a student is fully prepared to face the exam's rigorous criteria. It is crafted to match the overall theme of the exam, which emphasizes a general, solutions-oriented knowledge of security that organizations want.

SYNOPSIS

This study guide describes the major concepts defined in each of the ten domains established by the certified information systems security professional (CISSP) common body of knowledge. Each chapter breaks down security requirements, the networks and systems most related to the domain, the various tools available to address the requirements in the environment, and the means of assuring that the requirements are being met. Topics include security models, distributed access control methods, DBMS architectures, key cryptography algorithms, intrusion detection systems, and data network components and technologies The CD-ROM contains sample questions. Annotation ©2004 Book News, Inc., Portland, OR

     



Home | Private Policy | Contact Us
@copyright 2001-2005 ReadingBee.com