Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CISSP: Certified Information Systems Security Professional Study Guide

Buy
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book and on the CD

Authoritative coverage of all test domains, including: Access Control Systems & Methodology Applications & Systems Development Business Continuity Planning Cryptography Law, Investigation & Ethics Operations Security Physical Security Security Architecture & Models Security Management Practices Telecommunications, Network & Internet Security

On the CD The enclosed CD is packed with vital preparation tools and materials, beginning with the Sybex testing engine for the CISSP exam. Loaded with hundreds of practice questions, it lets you test yourself chapter by chapter. You'll also find electronic flashcards for your PCs, Pocket PCs, and Palm handhelds, two bonus exams that will help you prepare for the test, and an electronic version of the entire book. 

About the Author

James Michael Stewart, CISSP, has been writing and training for more than 14 years, with a current focus on security. He has taught dozens of CISSP training courses, not to mention numerous sessions on Windows security and the Certified Ethical Hacker certification. He is the author of several books and courseware sets on security certification, Microsoft topics, and network administration. More information about Michael can be found at his website: www.impactonline.com

Ed Tittel is a full-time freelance writer, trainer, and consultant specializing in matters related to information security, markup languages, and networking technologies. He is a regular contributor to numerous TechTarget websites; teaches online security and technology courses for companies including HP, Sony, and Motorola; and writes regularly for Tom’s Hardware. Ed’s professional bio and other information are available at www.edtittel.com

Mike Chapple , CISSP, is an IT security professional with the University of Notre Dame. In the past, he was chief information officer of Brand Institute and an information security researcher with the National Security Agency and the U.S. Air Force. His primary areas of expertise include network intrusion detection and access controls. Mike is a frequent contributor to TechTarget’s SearchSecurity site, a technical editor for Information Security magazine, and the author of several information security titles including The GSEC Prep Guide from Wiley and Information Security Illuminated from Jones and Bartlett Publishers.

(HTML tags aren't allowed.)

IT Outsourcing: Concepts, Methodologies, Tools, and Applications
IT Outsourcing: Concepts, Methodologies, Tools, and Applications
Examining the ideas and approaches necessary in deciding to outsource services and functions is a crucial assessment for any company.

IT Outsourcing: Concepts, Methodologies, Tools, and Applications covers a wide range of topics involved in the outsourcing of information technology through state-of-the-art collaborations of...

Visual Basic® 2010
Visual Basic® 2010

The first time I ever heard from Alessandro was through my blog contact form. A few years ago he reached out to me about his interest in donating an article to the Visual Basic Developer Center on MSDN. Reading his email, it was immediately apparent that Alessandro was passionate about programming and particularly the Visual Basic language....

Ubiquitous Multimedia and Mobile Agents: Models and Implementations
Ubiquitous Multimedia and Mobile Agents: Models and Implementations

Ubiquitous multimedia systems, or mobile multimedia systems, offer the promise of pervasive delivery of multimedia content to mobile users and their handheld devices.

Ubiquitous Multimedia and Mobile Agents: Models and Implementations provides the hybridization of two paradigms, namely, ubiquitous/mobile multimedia and mobile...


Excel Best Practices for Business: Covers Excel 2003, 2002, and 2000
Excel Best Practices for Business: Covers Excel 2003, 2002, and 2000

Everything you need to know about

  • Implementing the new XML features in Spreadsheet Portals and Web Services
  • Auditing spreadsheets provided by third parties
  • Making spreadsheets accessible to individuals with disabilities
  • Performing spreadsheet makeovers
  • Constructing...
Congenital Heart Disease: Molecular Diagnostics (Methods in Molecular Medicine)
Congenital Heart Disease: Molecular Diagnostics (Methods in Molecular Medicine)

Prominent researchers and clinicians describe in detail all the latest laboratory techniques currently used to define the molecular genetic basis for congenital malformations of the heart, cardiomyopathies, cardiac tumors, and arrythmias in human patients. In particular, the methods can be used to identify in clinical samples those genetic...

Microsoft Windows Server AppFabric Cookbook
Microsoft Windows Server AppFabric Cookbook
Have you ever set foot in the kitchen with a certain hunger and found that you had no clue as to how to make that dish? At such a time a cookbook is a wonderful thing. That's why I appreciate this concept of a cookbook for workflows and services. At Microsoft when we build products they are often chocked full of little known...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy