CISSP Prep Guide

ISBN-10: 047126802X
ISBN-13: 9780471268024
Edition: 2nd 2003 (Revised)
List price: $80.00
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: The Certified Information Systems Security Professional (CISSP) is the industry standard test on IT security. This guide helps security professionals prepare for the exam while providing a reference on key information security areas.

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $80.00
Edition: 2nd
Copyright year: 2003
Publisher: John Wiley & Sons, Incorporated
Publication date: 10/31/2002
Binding: Hardcover
Pages: 976
Size: 7.50" wide x 9.25" long x 2.25" tall
Weight: 4.136
Language: English

The Certified Information Systems Security Professional (CISSP) is the industry standard test on IT security. This guide helps security professionals prepare for the exam while providing a reference on key information security areas.

Acknowledgments
Foreword
Introduction
About the Authors
Security Management Practices
Sample Questions
Bonus Questions
Advanced Sample Questions
Access Control Systems
Rationale
Controls
Identification and Authentication
Some Access Control Issues
Sample Questions
Bonus Questions
Advanced Sample Questions
Telecommunications and Network Security
Our Goals
Domain Definition
Management Concepts
Sample Questions
Bonus Questions
Advanced Sample Questions
Cryptography
Introduction
Cryptographic Technologies
Secret Key Cryptography
Public (Asymmetric) Key Cryptosystems
Approaches to Escrowed Encryption
Internet Security Applications
Sample Questions
Bonus Questions
Advanced Sample Questions
Security Architecture and Models
Security Architecture
Assurance
Information Security Models
Sample Questions
Bonus Questions
Advanced Sample Questions
Operations Security
Our Goals
Domain Definition
Controls and Protections
Monitoring and Auditing
Threats and Vulnerabilities
Sample Questions
Bonus Questions
Advanced Sample Questions
Applications and Systems Development
The Software Life Cycle
Development Process
The Software Capability Maturity Model (CMM
Object-Oriented Systems
Artificial Intelligence Systems
Database Systems
Application Controls
Sample Questions
Bonus Questions
Advanced Sample Questions
Business Continuity Planning and Disaster Recovery Planning
Our Goals
Domain Definition
Business Continuity Planning
Disaster Recovery Planning
Sample Questions
Bonus Questions
Advanced Sample Questions
Law, Investigation, and Ethics
Types of Computer Crime
Law
Investigation
Liability
Ethics
Sample Questions
Bonus Questions
Advanced Sample Questions
Physical Security
Our Goals
Domain Definition
Threats to Physical Security
Controls for Physical Security
Sample Questions
Bonus Questions
Advanced Sample Questions
A Process Approach to HIPAA Compliance through a HIPAA-CMM
Background
HIPAA Security Requirements Mappings to PAs
HPAs
Defining and Using the HIPAA-CMM
Conclusion
References
HIPAA-CMM PA Overview
Glossary (SSE-CMM v2.0
The Ideal Approach to Process Improvement
SSE-CMM MAPPINGS and General Considerations
The NSA InfoSec Assessment Methodology
History of the NIPC
About the ISSO
The InfoSec Assessment Methodology
PDD#63
The Case for Ethical Hacking
Rationale
Roles and Responsibilities
Implementation
Summary
The Common Criteria
Common Criteria: Launching the International Standard
Glossary
For More Information
BS7799
HIPAA Updates
Scope
Title II Administrative Simplification
Conclusion
References for Further Study
Web Sites
Answers to Sample and Bonus Questions
Chapter 1-Security Management Practices
Chapter 2-Access Control Systems and Methodology
Chapter 3-Telecommunications and Network Security
Chapter 4-Cryptography
Chapter 5-Security Architecture and Models
Chapter 6-Operations Security
Chapter 7-Applications and Systems Development
Chapter 8-Business Continuity Planning-Disaster Recovery Planning
Chapter 9-Law, Investigation, and Ethics
Chapter 10-Physical Security
Answers to Advanced Sample Questions
Chapter 1-Security Management Practices
Chapter 2-Access Control Systems and Methodology
Chapter 3-Telecommunications and Network Security
Chapter 4-Cryptography
Chapter 5-Security Architecture and Models
Chapter 6-Operations Security
Chapter 7-Applications and Systems Development
Chapter 8-Business Continuity Planning-Disaster Recovery Planning
Chapter 9-Law, Investigation, and Ethics
Chapter 10-Physical Security
Notes
What's on the CD-ROM
Glossary of Terms and Acronyms
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×