x

Our Privacy Policy has changed. By using this site, you agree to the Privacy Policy.

CISSP Prep Guide Mastering the Ten Domains of Computer Security

ISBN-10: 0471413569
ISBN-13: 9780471413561
Edition: 2001
List price: $89.50
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can cost millions of dollars. The need for these companies to  More...

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $89.50
Copyright year: 2001
Publisher: John Wiley & Sons, Incorporated
Publication date: 9/10/2001
Binding: Hardcover
Pages: 576
Size: 7.75" wide x 9.50" long x 1.50" tall
Weight: 2.640
Language: English

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can cost millions of dollars. The need for these companies to protect their networks and information systems has, in turn, created an unprecedented demand for information systems security professionals. In fact, today?s companies are fiercely headhunting for Certified Information Systems Security Professionals (CISSP). Based on the extensive test experience of the authors, this book serves as both a prep guide for IT professionals seeking to advance their careers through CISSP certification and as a reference on fundamental and emerging information security knowledge.

Foreword
Introduction
Acknowledgments
About the Authors
Security Management Practices
Our Goals
Domain Definition
Management Concepts
Information Classification Process
Security Policy Implementation
Roles and Responsibilities
Risk Management
Security Awareness
Sample Questions
Access Control Systems
Rationale
Controls
Identification and Authentication
Some Access Control Issues
Sample Questions
Telecommunications and Network Security
Our Goals
Domain Definition
Management Concepts
Technology Concepts
Sample Questions
Cryptography
Introduction
Cryptographic Technologies
Secret Key Cryptography (Symmetric Key)
Public (Asymmetric) Key Cryptosystems
Approaches to Escrowed Encryption
Internet Security Applications
Sample Questions
Security Architecture and Models
Security Architecture
Assurance
Information Security Models
Sample Questions
Operations Security
Our Goals
Domain Definition
Controls and Protections
Monitoring and Auditing
Threats and Vulnerabilities
Sample Questions
Applications and Systems Development
The Software Life Cycle Development Process
The Software Capability Maturity Model (CMM)
Object-Oriented Systems
Artificial Intelligence Systems
Database Systems
Application Controls
Sample Questions
Business Continuity Planning and Disaster Recovery Planning
Our Goals
Domain Definition
Business Continuity Planning
Disaster Recovery Planning
Sample Questions
Law, Investigation, and Ethics
Introduction
Law
Investigation
Liability
Ethics
Sample Questions
Physical Security
Our Goals
Domain Definition
Threats to Physical Security
Controls for Physical Security
Sample Questions
Glossary of Terms and Acronyms
The Rainbow Series
Answers to Sample Questions
Security Management Practices
Access Control Systems and Methodology
Telecommunications and Network Security
Cryptography
Security Architecture and Models
Operations Security
Applications and Systems Development
Business Continuity Planning and Disaster Recovery Planning
Law, Investigation, and Ethics
Physical Security
A Process Approach to HIPAA Compliance through a HIPAA-CMM
The NSA InfoSec Assessment Methodology
The Case for Ethical Hacking
The Common Criteria
References for Further Study
British Standard 7799
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×