Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISSP: Certified Information Systems Security Professional Study Guide

Buy
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book and on the CD

Authoritative coverage of all test domains, including: Access Control Systems & Methodology Applications & Systems Development Business Continuity Planning Cryptography Law, Investigation & Ethics Operations Security Physical Security Security Architecture & Models Security Management Practices Telecommunications, Network & Internet Security

On the CD The enclosed CD is packed with vital preparation tools and materials, beginning with the Sybex testing engine for the CISSP exam. Loaded with hundreds of practice questions, it lets you test yourself chapter by chapter. You'll also find electronic flashcards for your PCs, Pocket PCs, and Palm handhelds, two bonus exams that will help you prepare for the test, and an electronic version of the entire book. 

About the Author

James Michael Stewart, CISSP, has been writing and training for more than 14 years, with a current focus on security. He has taught dozens of CISSP training courses, not to mention numerous sessions on Windows security and the Certified Ethical Hacker certification. He is the author of several books and courseware sets on security certification, Microsoft topics, and network administration. More information about Michael can be found at his website: www.impactonline.com

Ed Tittel is a full-time freelance writer, trainer, and consultant specializing in matters related to information security, markup languages, and networking technologies. He is a regular contributor to numerous TechTarget websites; teaches online security and technology courses for companies including HP, Sony, and Motorola; and writes regularly for Tom’s Hardware. Ed’s professional bio and other information are available at www.edtittel.com

Mike Chapple , CISSP, is an IT security professional with the University of Notre Dame. In the past, he was chief information officer of Brand Institute and an information security researcher with the National Security Agency and the U.S. Air Force. His primary areas of expertise include network intrusion detection and access controls. Mike is a frequent contributor to TechTarget’s SearchSecurity site, a technical editor for Information Security magazine, and the author of several information security titles including The GSEC Prep Guide from Wiley and Information Security Illuminated from Jones and Bartlett Publishers.

(HTML tags aren't allowed.)

Transport Equations in Biology (Frontiers in Mathematics)
Transport Equations in Biology (Frontiers in Mathematics)
This book presents models written as partial differential equations and originating from various questions in population biology, such as physiologically structured equations, adaptive dynamics, and bacterial movement. Its purpose is to derive appropriate mathematical tools and qualitative properties of the solutions (long time behavior,...
How to Do Everything with Google Tools
How to Do Everything with Google Tools
Nearly twenty years ago I was introduced to a fascinating new technology that has now become part of our everyday activity. At the time, I thought it was extremely cool to log into a distant server and read stuff. At the time, that stuff came at a hefty price—Internet time was over $2.00 per hour, connection speeds were measured in bauds, and...
Developing J2EE Applications with WebSphere Studio: IBM Certified Enterprise Developer (IBM Certification Study Guides)
Developing J2EE Applications with WebSphere Studio: IBM Certified Enterprise Developer (IBM Certification Study Guides)

To succeed in today's challenging business environment, companies need software developers who can implement integrated enterprise-wide applications and satisfy the demands of customers whose needs continue to evolve. Not only can you become that enterprise developer, but you can also be certified by IBM in the greatest technology...


Random Polymer Models
Random Polymer Models

This work deals with a well-defined class of probabilistic models. The focus is on polymers. More precisely I should say that the focus is on the equilibrium statistical mechanics of a class of polymers: dynamical and non-equilibrium phenomena are not treated, reflecting the fact that these directions are at the moment...

Building eCommerce Applications
Building eCommerce Applications

This collection of articles and blog entries is representative of the full spectrum of commerce-related content we’ve published on PayPal’s Developer Network over the past year. You will find tutorials and quick reference pieces for developers.

With the creation of x.commerce, we’ve expanded our coverage to
...

Algorithms and Data Structures in C++ (Computer Engineering)
Algorithms and Data Structures in C++ (Computer Engineering)

Algorithms and Data Structures in C++ introduces modern issues in the theory of algorithms, emphasizing complexity, graphs, parallel processing, and visualization. To accomplish this, the book uses an appropriate subset of frequently utilized and representative algorithms and applications in order to demonstrate the unique and modern aspects...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy