Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISSP: Certified Information Systems Security Professional Study Guide

Buy
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book and on the CD

Authoritative coverage of all test domains, including: Access Control Systems & Methodology Applications & Systems Development Business Continuity Planning Cryptography Law, Investigation & Ethics Operations Security Physical Security Security Architecture & Models Security Management Practices Telecommunications, Network & Internet Security

On the CD The enclosed CD is packed with vital preparation tools and materials, beginning with the Sybex testing engine for the CISSP exam. Loaded with hundreds of practice questions, it lets you test yourself chapter by chapter. You'll also find electronic flashcards for your PCs, Pocket PCs, and Palm handhelds, two bonus exams that will help you prepare for the test, and an electronic version of the entire book. 

About the Author

James Michael Stewart, CISSP, has been writing and training for more than 14 years, with a current focus on security. He has taught dozens of CISSP training courses, not to mention numerous sessions on Windows security and the Certified Ethical Hacker certification. He is the author of several books and courseware sets on security certification, Microsoft topics, and network administration. More information about Michael can be found at his website: www.impactonline.com

Ed Tittel is a full-time freelance writer, trainer, and consultant specializing in matters related to information security, markup languages, and networking technologies. He is a regular contributor to numerous TechTarget websites; teaches online security and technology courses for companies including HP, Sony, and Motorola; and writes regularly for Tom’s Hardware. Ed’s professional bio and other information are available at www.edtittel.com

Mike Chapple , CISSP, is an IT security professional with the University of Notre Dame. In the past, he was chief information officer of Brand Institute and an information security researcher with the National Security Agency and the U.S. Air Force. His primary areas of expertise include network intrusion detection and access controls. Mike is a frequent contributor to TechTarget’s SearchSecurity site, a technical editor for Information Security magazine, and the author of several information security titles including The GSEC Prep Guide from Wiley and Information Security Illuminated from Jones and Bartlett Publishers.

(HTML tags aren't allowed.)

Testing IT: An Off-the-Shelf Software Testing Process
Testing IT: An Off-the-Shelf Software Testing Process

Why is astronomy considered a science while astrology is considered only a pseudoscience? In other words, how can we prove that a theory faithfully describes reality, and that this theory can then be used to predict unknown facts? Karl Popper, the well-known philosopher, studied these problems and summarized his conclusions in one...

Doing Math with Python shows you how to use Python to delve into high school–level math topics like statistics, geometry, probability, and calculus. You’ll start with simple projects, like a factoring program and a quadratic-equation solver, and then create more complex projects once you’ve gotten the hang of...

Routledge Handbook of Surveillance Studies (Routledge International Handbooks)
Routledge Handbook of Surveillance Studies (Routledge International Handbooks)

Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the...


Software Engineering: A Practitioner's Approach (McGraw-Hill Series in Computer Science)
Software Engineering: A Practitioner's Approach (McGraw-Hill Series in Computer Science)

When a computer software succeeds—when it meets the needs of the people who use it, when it performs flawlessly over a long period of time, when it is easy to modify and even easier to use—it can and does change things for the better. But when software fails—when its users are dissatisfied, when it is error prone, when it is...

Introducing Microsoft Expression Studio: Using Design, Web, Blend, and Media to Create Professional Digital Content
Introducing Microsoft Expression Studio: Using Design, Web, Blend, and Media to Create Professional Digital Content
The World WideWeb is continually becoming more complex in sophistication. To get attention and be credible, your site has to have professional-quality graphics. It needs to be usable and give your visitors an interactive and compelling experience. For professional graphic designers and Web site architects, it’s a golden age, because...
Pro Dynamic .NET 4.0 Applications: Data-Driven Programming for the .NET Framework
Pro Dynamic .NET 4.0 Applications: Data-Driven Programming for the .NET Framework

As a developer you are likely painfully aware that not all features of an application can be anticipated when the software ships. In order to cope with these eventualities and save yourself time (and perhaps money), it makes sense to write your applications in such a way that end users can be made as independent of the developers as possible....

©2020 LearnIT (support@pdfchm.net) - Privacy Policy