Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The SSCP Prep Guide: Mastering the Seven Key Areas of System Security

Buy
A one-stop source of security and privacy information for IT professionals, covering everything you’ll need to know to pass the Systems Security Certified Practitioner examination

This prep guide and general reference will help you breeze through the SSCP security certification test by greatly enhancing your understanding of how to implement security policies, standards, and procedures. Covered in detail are the seven domains of the common body of knowledge (CBK), as defined by the (ISC)2. Explore such topics as access controls, administration, audit and monitoring, cryptography, and data communications. Test yourself with 30 sample practice questions for each domain, which are similar to those you’ll encounter on the SSCP examination.

Providing you with all the tools you’ll need to become proficient in systems security, this guide covers:

  • Mechanisms to specify user and process rights
  • System vulnerabilities, safeguards, and recovery plans and procedures
  • Means to disguise information to ensure its integrity, confidentiality, authenticity, and nonrepudiation
  • Ways to protect against infection, abuse, or negative impacts to the proper operation of an information processing system or network

The CD-ROM contains a list of links to security Web sites as well as PDFs of the Risk Management Guide for Information Technology Systems (from NIST) and standards from FIPS. A special feature is the Wiley test engine, a complete interactive self-test using all the questions and answers from the book, powered by Boson software.

About the Author
DEBRA S. ISAAC is Vice President and Senior Technical Advisor at Corbett Technologies, a Virginia-based information security services company. She has more than 19 years of experience in the security systems field.

MICHAEL J. ISAAC is the INFOSEC Consulting Engineer for Corbett. He has more than 22 years of extensive experience in systems administration and security.

(HTML tags aren't allowed.)

Random Polymer Models
Random Polymer Models

This work deals with a well-defined class of probabilistic models. The focus is on polymers. More precisely I should say that the focus is on the equilibrium statistical mechanics of a class of polymers: dynamical and non-equilibrium phenomena are not treated, reflecting the fact that these directions are at the moment...

20,000 Leagues under the Sea: Complete and Unabridged
20,000 Leagues under the Sea: Complete and Unabridged
Founded in 1906 by J.M. Dent, the Everyman Library has always tried to make the best books ever written available to the greatest number of people at the lowest possible price. Unique editorial features that help Everyman Paperback Classics stand out from the crowd include: a leading scholar or literary critic's introduction to the text,...
Algebra DeMYSTiFieD, Second Edition
Algebra DeMYSTiFieD, Second Edition

Your SOLUTION to mastering ALGEBRA!

Trying to tackle algebra but nothing's adding up? No problem! Factor in Algebra Demystified, Second Edition and multiply your chances of learning this important branch of mathematics.

Written in a step-by-step format, this practical guide covers fractions, variables,...


Active Directory For Dummies (Computer/Tech)
Active Directory For Dummies (Computer/Tech)

Fully updated with all the exciting AD enhancements!

Design and deploy Active Directory to simplify policy and security management

This is not your dad's AD! Whether you just need to upgrade your knowledge from previous versions or you're starting fresh with Active Directory, this...

Design Computing and Cognition '10
Design Computing and Cognition '10

This volume contains the refereed and revised papers of the Fourth International Conference on Design Computing and Cognition (DCC'10), held in Stuttgart, Germany. The material in this book represents the state-of-the-art research and developments in design computing and design cognition.

The papers are grouped under the...

Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps
Hands-On Security in DevOps: Ensure continuous security, deployment, and delivery with DevSecOps

Protect your organization's security at all levels by introducing the latest strategies for securing DevOps

Key Features

  • Integrate security at each layer of the DevOps pipeline
  • Discover security practices to protect your cloud services by detecting fraud and...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy