Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced CISSP Prep Guide: Exam Q & A

Buy

Get ready to pass the CISSP exam and earn your certification with this advanced test guide

Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers, you’ll gain a better understanding of the key concepts associated with the ten domains of the common body of knowledge (CBK). Each question is designed to test you on the information you’ll need to know in order to pass the exam. Along with explanations of the answers to these advanced questions, you’ll find discussions on some common incorrect responses as well. In addition to serving as an excellent tutorial, this book presents you with the latest developments in information security. It includes new information on:

  • Carnivore, Echelon, and the U.S. Patriot Act
  • The Digital Millennium Copyright Act (DMCA) and recent rulings
  • The European Union Electronic Signature Directive
  • The Advanced Encryption Standard, biometrics, and the Software Capability Maturity Model
  • Genetic algorithms and wireless security models
  • New threats and countermeasures

The CD-ROM includes all the questions and answers from the book with the Boson-powered test engine.

About the Author

RONALD L. KRUTZ, PhD, PE, CISSP, is Director of Privacy for Corbett Technologies, specializing in information assurance and privacy appraisal methodologies. Dr. Krutz is also a distinguished visiting lecturer in the University of New Haven Computer Forensics Program. He was a lead instructor for the CISSP CBK review seminars, former associate director of the Carnegie Mellon Research Institute (CMRI), and a faculty member in the Carnegie Mellon University Department of Electrical and Computer Engineering. Krutz is the author of four previous books, including The CISSP Prep Guide (Wiley).

RUSSELL DEAN VINES, CISSP, CCNA, MCSE, MCNE, is President and founder of the RDV Group Inc., a New York Citybased security consulting services firm. His company is active in detecting, preventing, and solving security vulnerabilities for clients in government, finance, and new media organizations. He directed the Security Consulting Services Group for Realtech Systems Corporation, and managed international information networks for CBS/Fox Video, Inc. Vines is the author of Wireless Security Essentials and coauthor of The CISSP Prep Guide (both from Wiley).

(HTML tags aren't allowed.)

Linux Shell Scripting Cookbook
Linux Shell Scripting Cookbook

GNU/Linux is a remarkable operating system that comes with a complete development environment that is stable, reliable, and extremely powerful. The shell, being the native interface to communicate with the operating system, is capable of controlling the entire operating system. An understanding of shell scripting helps you to have better...

HTML5 Games: Creating Fun with HTML5, CSS3, and WebGL
HTML5 Games: Creating Fun with HTML5, CSS3, and WebGL
"All this is done in HTML5, by the way!" exclaimed Steve Jobs, the mind and face of the Apple success story, as he walked the audience through the new HTMLs-powered ad system at the iPhone OS 4.0 Keynote, receiving cheers, laughs, and applause in return. The recent developments in open, standards-based web technologies...
Managing Globally with Information Technology
Managing Globally with Information Technology

As the world economy becomes more interdependent and competition for business continues to be more globally oriented, it has become necessary to address the issues of IT management from a broader global focus. Information technology is not only the enabler of the global marketplace but also a potential solution base for achieving global...


Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Internals, Part 1: Covering Windows Server 2008 R2 and Windows 7
Windows Internals, Sixth Edition is intended for advanced computer professionals (both developers and system administrators) who want to understand how the core components of the Microsoft Windows 7 and Windows Server 2008 R2 operating systems work internally. With this knowledge, developers can better...
Implementing 802.11, 802.16, and 802.20 Wireless Networks: Planning, Troubleshooting, and Operations
Implementing 802.11, 802.16, and 802.20 Wireless Networks: Planning, Troubleshooting, and Operations

For nearly a century, voice communications networks have been king of the hill. The growth of the Internet in the 1990’s has given rise to the need for data communications networks that are as well developed and flexible as the voice networks that are currently in place. Broadband connectivity has become available in certain places...

Web Matrix Developer's Guide
Web Matrix Developer's Guide
"I1's free!" That phrase emblazons many products. Everything from coupons in your local grocery store to the trade paper you read this morning use that phrase. Web Matrix is another product that uses the phrase "It's free!" However, unlike many products for which free also me ans nonuseful, Web Matrix is...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy