Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Fully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (CISSP) exam. Written by a renowned security expert and CISSP, this guide features complete details on all 10 exam domains...
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. TheOfficial (ISC)2 Guide to the CCSPSM CBK Second Edition is your ticket for expert...
The only official study guide for the new CCSP exam
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter...
A one-stop source of security and privacy information for IT professionals, covering everything you’ll need to know to pass the Systems Security Certified Practitioner examination
This prep guide and general reference will help you breeze through the SSCP security certification test by greatly enhancing your understanding of how to...
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:
Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...
Over the past years, Public Key Infrastructure (PKI) technology has evolved and moved from the research laboratories to the mainstream, in which many organizations are now leveraging it as part of their core infrastructure system for providing and building security in their businesses. Understanding the challenges and requirements of PKI related...
Certification and accreditation has become a major topic of discussion in the information security arena over the past two to three years, at least in U.S. government circles. Many government organizations are currently engaged in employing certification and accreditation processes in response to the requirements of the Federal...