- Wydawnictwo: McGraw-Hill
- Data wydania: 10 lutego 2012
- Liczba stron: 1008
A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris.
Well regarded for its engaging and informative style, CISSP All-in-One Exam Guide, Sixth Edition provides 100% complete coverage of the exam objectives for the Certified Information Security Specialist credentialing exam from ISC2. Updated to ensure total coverage of the latest body of knowledge from ISC2, this new edition also provides references for government employees and contractors subject to new requirements.
Exam tips highlight actual exam topics and technical discussion sidebars offer a level of instruction not found in other certification guides. The All-in-One also includes hands-on examples and exercises that reinforce practical learning and sample practice questions at the end of each chapter that test for comprehension and prepare you for each subject area or domain of the exam.
CISSP All-in-One Exam Guide, Sixth Edition
- Written by the bestselling IT security certification test prep author
- Provides a map to DOD Directive 8570 requirements
- Includes CD-ROM with more than 250 simulated practice questions in a Windows-based test engine, a PDF copy of the book, and video training from the author
- Provides a low-cost, self-study training solution
- Serves as a valuable on-the-job reference after certification
Becoming a CISSP; Security Trends; Information Security and Risk Management; Access Control; Security Architecture and Design; Physical and Environmental Security; Telecommunications and Network Security; Cryptography; Business Continuity and Disaster Recovery; Legal, Regulations, Compliance, and Investigations; Application Security; Operations Security
Shon Harris, CISSP, MCSE, is a security consultant who provides security assessments and analysis, vulnerability testing, and solutions to a wide range of businesses. She was a member of the Information Warfare unit in the U.S. Air Force which performs military base assessments and “red-teaming” activities during aggressor exercises. Harris is a contributing writer to Information Security magazine and Windows 2000 magazine. She also teaches networking and security classes at local colleges.
Table of contents
Chapter 1: Becoming a CISSP
Chapter 2: Information Security and Risk Management
Chapter 3: Access Control
Chapter 4: Security Architecture and Design
Chapter 5: Physical (Environmental) Security
Chapter 6: Telecommunications and Network Security
Chapter 7: Cryptography
Chapter 8: Business Continuity&Disaster Recovery Planning
Chapter 9: Legal, Regulations, Compliance, and Investigations
Chapter 10: Software Development Security
Chapter 11: Security Operations
App A: Programming Language Generations
App B: Comprehensive Questions
App C: About the CD