CISSP : Certified Information Systems Security Professional Study Guide, 2/e
Ed Tittle, James M. Stewart, Mike Chapple, Ed Tittel, James Michael Stewart
買這商品的人也買了...
-
$1,029Fundamentals of Data Structures in C++
-
$680$537 -
$1,294Web Services: A Technical Introduction
-
$2,010$1,910 -
$780$741 -
$750$675 -
$560$504 -
$680$666 -
$850$723 -
$1,127Operating System Concepts with Java, 6/e (IE) (美國版ISBN:0471489050)
-
$680$612 -
$480$379 -
$750$593 -
$680Hardening Network Infrastructure
-
$890$703 -
$620$490 -
$540$427 -
$990$782 -
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$480$408 -
$650$514 -
$460$363 -
$640$506 -
$1,340$1,273 -
$580$452
相關主題
商品描述
Description:
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned Sybex the "Best Study Guide" designation in the 2003 CertCities Readers Choice Awards, this book provides:
- Clear and concise information on critical security technologies and topics
- Practical examples and insights drawn from real-world experience
- Leading-edge exam preparation software, including a testing engine and electronic flashcards for your Palm
You'll find authoritative coverage of key exam topics including:
- Access Control Systems & Methodology
- Applications & Systems Development
- Business Continuity Planning
- Cryptography
- Law, Investigation & Ethics
- Operations Security
- Physical Security
- Security Architecture & Models
- Security Management Practices
- Telecommunications, Network & Internet Security
Table of Contents:
Introduction
Assessment TestChapter 1: Accountability and Access Control
Chapter 2: Attacks and Monitoring
Chapter 3: ISO Model, Network Security, and Protocols
Chapter 4: Communications Security and Countermeasures
Chapter 5: Security Management Concepts and Principles
Chapter 6: Asset Value, Policies, and Roles
Chapter 7: Data and Application Security Issues
Chapter 8: Malicious Code and Application Attacks
Chapter 9: Cryptography and Private Key Algorithms
Chapter 10: PKI and Cryptographic Applications
Chapter 11: Principles of Computer Design
Chapter 12: Principles of Security Models
Chapter 13: Administrative Management
Chapter 14: Auditing and Monitoring
Chapter 15: Business Continuity Planning
Chapter 16: Disaster Recovery Planning
Chapter 17: Law and Investigations
Chapter 18: Incidents and Ethics
Chapter 19: Physical Security Requirements
GlossaryIndex