CISSP: Certified Information Systems Security Professional Study Guide, 5th Edition
Considered the most desired certification for IT security professionals, the Certified Information Systems Security Professional designation is also a career-booster. This comprehensive study guide covers every aspect of the 2011 exam and the latest revision of the CISSP body of knowledge. It offers advice on how to pass each section of the exam and features expanded coverage of biometrics, auditing and accountability, software security testing, and other key topics. Included is a CD with two full-length, 250-question sample exams to test your progress.
- CISSP certification identifies the ultimate IT security professional; this complete study guide is fully updated to cover all the objectives of the 2011 CISSP exam
- Provides in-depth knowledge of access control, application development security, business continuity and disaster recovery planning, cryptography, Information Security governance and risk management, operations security, physical (environmental) security, security architecture and design, and telecommunications and network security
- Also covers legal and regulatory investigation and compliance
- Includes two practice exams and challenging review questions on the CD
Professionals seeking the CISSP certification will boost their chances of success with CISSP: Certified Information Systems Security Professional Study Guide, 5th Edition.
1 Accountability and Access Control.
2 Attacks and Monitoring.
3 ISO Model, Protocols, Network Security, and Network Infrastructure.
4 Communications Security and Countermeasures.
5 Security Management Concepts and Principles.
6 Asset Value, Policies, and Roles.
7 Data and Application Security Issues.
8 Malicious Code and Application Attacks.
9 Cryptography and Private Key Algorithms.
10 PKI and Cryptographic Applications.
11 Principles of Computer Design.
12 Principles of Security Models.
13 Administrative Management.
14 Auditing and Monitoring.
15 Business Continuity Planning.
16 Disaster Recovery Planning.
17 Law and Investigations.
18 Incidents and Ethics.
19 Physical Security Requirements.
Appendix About the Companion CD.
James Michael Stewart, CISSP, is a security expert, technical trainer, and author who has written numerous publications, books, and courseware. Ed Tittel, CISSP, is a freelance writer and a regular contributor to numerous online outlets, including SearchSecurity.com, InformIT.com, and ITExpertVoice.com. He has authored over 140 books. Mike Chapple, PhD, CISSP, is an IT security professional with the University of Notre Dame. He was formerly chief information officer of Brand Institute and an information security researcher with the National Security Agency and the U.S. Air Force.
Do you think you've discovered an error in this book? Please check the list of errata below to see if we've already addressed the error. If not, please submit the error via our Errata Form. We will attempt to verify your error; if you're right, we will post a correction below.