Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security

Buy
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can cost millions of dollars. The need for these companies to protect their networks and information systems has, in turn, created an unprecedented demand for information systems security professionals. In fact, today’s companies are fiercely headhunting for Certified Information Systems Security Professionals (CISSP). Based on the extensive test experience of the authors, this book serves as both a prep guide for IT professionals seeking to advance their careers through CISSP certification and as a reference on fundamental and emerging information security knowledge. It focuses on the common body of knowledge (CBK) as defined by the International Information Systems Security Certification Consortium (IS C)2. The ten domains of the CBK are covered in detail, including security management, cryptography, disaster recovery planning, and telecommunications security. Each domain of the CBK is then followed by a series of sample practice questions that are similar to those that you’ll encounter on the CISSP examination, helping you better prepare for and pass the exam.

This comprehensive book:

  • Covers the fundamental content of the CBK in a way that is independent of the breakdown or possible merger of the domains
  • Provides questions on each CBK domain along with explanations of the answers
  • Reflects the most recent advances in the information security field
  • Avoids the extraneous mathematical derivations, presenting only the information you’ll need to know for the CISSP examination
  • Includes valuable reference material and explores advanced topics in the appendices

About the Author

RONALD L. KRUTZ is a lead instructor for the CISSP CBK review seminars. He spent twenty-four years at Carnegie Mellon University as a faculty member and then as an R&D Director at the Carnegie Mellon University Research Institute. Dr. Krutz is a Senior Information Security Consultant for Corbett Technologies, specializing in information assurance appraisal methodologies. He holds a PhD in Computer Engineering, is a registered Professional Engineer, and is a CISSP. He is the author of two previous Wiley books, Microprocessors and Logic Design and Microcomputer Interfacing.

RUSSELL DEAN VINES is President of the RDVGroup, a NYC-based security consulting services firm, and has been involved in computer security for nearly twenty years. He is a frequent speaker on security methodology, wireless security, and best practices in the information industry, and is also an instructor for the CISSP CBK review seminars. He has helped design and build the security architecture for Fortune 1000 Companies worldwide. He is a CISSP, CCNA, MCSE, MCNE, and a National Security Agency/IAM professional. Mr. Vines is also an accomplished jazz composer, performer, and educator.

(HTML tags aren't allowed.)

Healing Logics: Culture and Medicine in Modern Health Belief Systems
Healing Logics: Culture and Medicine in Modern Health Belief Systems

Scholars in folklore and anthropology are more directly involved in various aspects of medicine—such as medical education, clinical pastoral care, and negotiation of transcultural issues—than ever before. Old models of investigation that artificially isolated "folk medicine," "complementary and alternative...

Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts
Hands-on DevOps: Explore the concept of continuous delivery and integrate it with data science concepts

Transform yourself into a specialist in DevOps adoption for Big Data on cloud

Key Features

  • Learn the concepts of Bigdata and Devops and Implement them
  • Get Acquainted with DevOps Frameworks Methodologies and Tools
  • A practical approach to build and work efficiently with your...
Bridges to Infinity: The Human Side of Mathematics
Bridges to Infinity: The Human Side of Mathematics
Most of the reasons that I have written this book can be explained in terms of what reportedly happened one day in the eighteenth century when the great German mathematician Leonhard Euler confronted the eminent French scholar and atheist Denis Diderot with a spurious mathematical proof for the existence of God. Euler, it seems, accepted an...

Programming Microsoft Access 2000 (Microsoft Programming Series)
Programming Microsoft Access 2000 (Microsoft Programming Series)

This book is for database developers who want to use Microsoft Access 2000 to build custom applications. It covers the features that make Access a perennial favorite with developers, as well as the innovations in Access 2000 that you are most likely to use in your programming projects. Numerous programming samples demonstrate the core...

Thermodynamic Models for Industrial Applications: From Classical and Advanced Mixing Rules to Association Theories
Thermodynamic Models for Industrial Applications: From Classical and Advanced Mixing Rules to Association Theories

Using an applications perspective Thermodynamic Models forIndustrial Applications provides a unified framework for thedevelopment of various thermodynamic models, ranging from theclassical models to some of the most advanced ones. Among these arethe Cubic Plus Association Equation of State (CPA EoS) and thePerturbed Chain Statistical...

The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
If this book is to succeed and help readers, its cardinal virtue must be to provide
a simple reference text. It should be an essential addition to an information
security library. As such it should also serve the purpose of being a quick
refresher for terms the reader has not seen since the days when one attended a
computing
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy