Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The CISSP Prep Guide: Mastering the Ten Domains of Computer Security

Buy
A one-stop source of information covering everything you’ll need to know in order to pass the CISSP examination

The CISSP Prep Guide

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can cost millions of dollars. The need for these companies to protect their networks and information systems has, in turn, created an unprecedented demand for information systems security professionals. In fact, today’s companies are fiercely headhunting for Certified Information Systems Security Professionals (CISSP). Based on the extensive test experience of the authors, this book serves as both a prep guide for IT professionals seeking to advance their careers through CISSP certification and as a reference on fundamental and emerging information security knowledge. It focuses on the common body of knowledge (CBK) as defined by the International Information Systems Security Certification Consortium (IS C)2. The ten domains of the CBK are covered in detail, including security management, cryptography, disaster recovery planning, and telecommunications security. Each domain of the CBK is then followed by a series of sample practice questions that are similar to those that you’ll encounter on the CISSP examination, helping you better prepare for and pass the exam.

This comprehensive book:

  • Covers the fundamental content of the CBK in a way that is independent of the breakdown or possible merger of the domains
  • Provides questions on each CBK domain along with explanations of the answers
  • Reflects the most recent advances in the information security field
  • Avoids the extraneous mathematical derivations, presenting only the information you’ll need to know for the CISSP examination
  • Includes valuable reference material and explores advanced topics in the appendices

About the Author

RONALD L. KRUTZ is a lead instructor for the CISSP CBK review seminars. He spent twenty-four years at Carnegie Mellon University as a faculty member and then as an R&D Director at the Carnegie Mellon University Research Institute. Dr. Krutz is a Senior Information Security Consultant for Corbett Technologies, specializing in information assurance appraisal methodologies. He holds a PhD in Computer Engineering, is a registered Professional Engineer, and is a CISSP. He is the author of two previous Wiley books, Microprocessors and Logic Design and Microcomputer Interfacing.

RUSSELL DEAN VINES is President of the RDVGroup, a NYC-based security consulting services firm, and has been involved in computer security for nearly twenty years. He is a frequent speaker on security methodology, wireless security, and best practices in the information industry, and is also an instructor for the CISSP CBK review seminars. He has helped design and build the security architecture for Fortune 1000 Companies worldwide. He is a CISSP, CCNA, MCSE, MCNE, and a National Security Agency/IAM professional. Mr. Vines is also an accomplished jazz composer, performer, and educator.

(HTML tags aren't allowed.)

Analog Behavioral Modeling with the Verilog-A Language
Analog Behavioral Modeling with the Verilog-A Language
Analog Behavioral Modeling With The Verilog-A Language provides the IC designer with an introduction to the methodologies and uses of analog behavioral modeling with the Verilog-A language. In doing so, an overview of Verilog-A language constructs as well as applications using the language are presented. In addition, the book is...
Principles Of Radiation Interaction In Matter And Detection
Principles Of Radiation Interaction In Matter And Detection
Data analysis and instrumentation applications require an excellent knowledge of the interactions between radiation and matter, radiation and particle detectors, the principles and conditions of detector operation, as well as the limitations and advantages. This book provides abundant information about the energy deposition in detecting systems,...
Fashioning Technology: A DIY Intro to Smart Crafting (Craft: Projects)
Fashioning Technology: A DIY Intro to Smart Crafting (Craft: Projects)

Ready to take your craft projects to the next level? With "smart" materials, unorthodox assembly techniques, and the right tools, you can create accessories, housewares, and toys that light up, make sounds, or do even more. Fashioning Technology is an introductory DIY book that brings technology and crafts together in a fun...


Ray Tracing from the Ground Up
Ray Tracing from the Ground Up
Computer graphics involves simulating the distribution of light in a 3D environment. There are only a few fundamentally different algorithms that have survived the test of time. They can be loosely classified into projective algorithms and image-space algorithms. The former class projects each geo metric primitive onto the...
Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
Beginning SharePoint Administration: Windows SharePoint Services and SharePoint Portal Server
Beginning SharePoint Administration: Windows SharePoint Services and SharePoint Portal Server
This practical guide covers the many uses of SharePoint 2003 as well as the differences between SharePoint Portal Server (SPS) and Windows(r) SharePoint Services (WSS). In addition, the book will help you decide if you need only WSS or if you should also implement SPS.

While the main focus is on planning, installation, configuration, and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy