CISSP: Certified Information Systems Security Professional Study Guide, 5th Edition

by ; ;
Edition: 5th
Format: Paperback
Pub. Date: 2011-01-01
Publisher(s): Sybex
List Price: $59.99

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This comprehensive book will guide readers through CISSP exam topics, including: Access Control Application Development Security Business Continuity and Disaster Recovery Planning Cryptography Information Security Governance and Risk Management Legal, Regulations, Investigations and Compliance Operations Security Physical (Environmental) Security Security Architecture and Design Telecommunications and Network SecurityThis study guide will be complete with 100% coverage of the exam objectives, real world scenarios, hands-on exercises, and challenging review questions, both in the book and on the CD.

Author Biography

James Michael Stewart, CISSP, is a security expert, technical trainer, and author who has written numerous publications, books, and courseware. Ed Tittel, CISSP, is a freelance writer and a regular contributor to numerous online outlets, including SearchSecurity.com, InformIT.com, and ITExpertVoice.com. He has authored over 140 books. Mike Chapple, PhD, CISSP, is an IT security professional with the University of Notre Dame. He was formerly chief information officer of Brand Institute and an information security researcher with the National Security Agency and the U.S. Air Force.

Table of Contents

Introduction.

1 Accountability and Access Control.

2 Attacks and Monitoring.

3 ISO Model, Protocols, Network Security, and Network Infrastructure.

4 Communications Security and Countermeasures.

5 Security Management Concepts and Principles.

6 Asset Value, Policies, and Roles.

7 Data and Application Security Issues.

8 Malicious Code and Application Attacks.

9 Cryptography and Private Key Algorithms.

10 PKI and Cryptographic Applications.

11 Principles of Computer Design.

12 Principles of Security Models.

13 Administrative Management.

14 Auditing and Monitoring.

15 Business Continuity Planning.

16 Disaster Recovery Planning.

17 Law and Investigations.

18 Incidents and Ethics.

19 Physical Security Requirements.

Appendix About the Companion CD.

Index.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.