CISSP: Certified Information Systems Security Professional Study Guide, Fourth Edition (includes CD-ROM)
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title CISSP: Certified Information Systems Security Professional Study Guide, Fourth Edition (includes CD-ROM)

English

James Michael Stewart, CISSP, has been writing and training for more than 14 years, with a current focus on security. He has taught dozens of CISSP training courses, not to mention numerous sessions on Windows security and the Certified Ethical Hacker certification. He is the author of several books and courseware sets on security certification, Microsoft topics, and network administration. More information about Michael can be found at his website: www.impactonline.com

Ed Tittel is a full-time freelance writer, trainer, and consultant specializing in matters related to information security, markup languages, and networking technologies. He is a regular contributor to numerous TechTarget websites; teaches online security and technology courses for companies including HP, Sony, and Motorola; and writes regularly for Tom’s Hardware. Ed’s professional bio and other information are available at www.edtittel.com

Mike Chapple , CISSP, is an IT security professional with the University of Notre Dame. In the past, he was chief information officer of Brand Institute and an information security researcher with the National Security Agency and the U.S. Air Force. His primary areas of expertise include network intrusion detection and access controls. Mike is a frequent contributor to TechTarget’s SearchSecurity site, a technical editor for Information Security magazine, and the author of several information security titles including The GSEC Prep Guide from Wiley and Information Security Illuminated from Jones and Bartlett Publishers.

English

Introduction.

Assessment Test.

Chapter 1: Accountability and Access Control.

Chapter 2: Attacks and Monitoring.

Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure.

Chapter 4: Communications Security and Countermeasures.

Chapter 5: Security Management Concepts and Principles.

Chapter 6: Asset Value, Policies, and Roles.

Chapter 7: Data and Application Security Issues.

Chapter 8: Malicious Code and Application Attacks.

Chapter 9: Cryptography and Private Key Algorithms.

Chapter 10: PKI and Cryptographic Applications.

Chapter 11: Principles of Computer Design.

Chapter 12: Principles of Security Models.

Chapter 13: Administrative Management.

Chapter 14: Auditing and Monitoring.

Chapter 15: Business Continuity Planning.

Chapter 16: Disaster Recovery Planning.

Chapter 17: Law and Investigations.

Chapter 18: Incidents and Ethics.

Chapter 19: Physical Security Requirements.

Appendix: About the Companion CD.

Glossary.

Index.

loading