Skip to content

CISSP Prep Guide Mastering the Ten Domains of Computer Security

Best in textbook rentals since 2012!

ISBN-10: 0471413569

ISBN-13: 9780471413561

Edition: 2001

Authors: Ronald L. Krutz, Russell Dean Vines, Edward M. Stroz

List price: $89.50
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

From stolen intellectual proprietary and denial of service attacks to unauthorized use of critical resources and computer viruses, e-business companies face numerous threats each day that can cost millions of dollars. The need for these companies to protect their networks and information systems has, in turn, created an unprecedented demand for information systems security professionals. In fact, today?s companies are fiercely headhunting for Certified Information Systems Security Professionals (CISSP). Based on the extensive test experience of the authors, this book serves as both a prep guide for IT professionals seeking to advance their careers through CISSP certification and as a…    
Customers also bought

Book details

List price: $89.50
Copyright year: 2001
Publisher: John Wiley & Sons, Incorporated
Publication date: 9/10/2001
Binding: Hardcover
Pages: 576
Size: 7.75" wide x 9.50" long x 1.50" tall
Weight: 2.640
Language: English

Foreword
Introduction
Acknowledgments
About the Authors
Security Management Practices
Our Goals
Domain Definition
Management Concepts
Information Classification Process
Security Policy Implementation
Roles and Responsibilities
Risk Management
Security Awareness
Sample Questions
Access Control Systems
Rationale
Controls
Identification and Authentication
Some Access Control Issues
Sample Questions
Telecommunications and Network Security
Our Goals
Domain Definition
Management Concepts
Technology Concepts
Sample Questions
Cryptography
Introduction
Cryptographic Technologies
Secret Key Cryptography (Symmetric Key)
Public (Asymmetric) Key Cryptosystems
Approaches to Escrowed Encryption
Internet Security Applications
Sample Questions
Security Architecture and Models
Security Architecture
Assurance
Information Security Models
Sample Questions
Operations Security
Our Goals
Domain Definition
Controls and Protections
Monitoring and Auditing
Threats and Vulnerabilities
Sample Questions
Applications and Systems Development
The Software Life Cycle Development Process
The Software Capability Maturity Model (CMM)
Object-Oriented Systems
Artificial Intelligence Systems
Database Systems
Application Controls
Sample Questions
Business Continuity Planning and Disaster Recovery Planning
Our Goals
Domain Definition
Business Continuity Planning
Disaster Recovery Planning
Sample Questions
Law, Investigation, and Ethics
Introduction
Law
Investigation
Liability
Ethics
Sample Questions
Physical Security
Our Goals
Domain Definition
Threats to Physical Security
Controls for Physical Security
Sample Questions
Glossary of Terms and Acronyms
The Rainbow Series
Answers to Sample Questions
Security Management Practices
Access Control Systems and Methodology
Telecommunications and Network Security
Cryptography
Security Architecture and Models
Operations Security
Applications and Systems Development
Business Continuity Planning and Disaster Recovery Planning
Law, Investigation, and Ethics
Physical Security
A Process Approach to HIPAA Compliance through a HIPAA-CMM
The NSA InfoSec Assessment Methodology
The Case for Ethical Hacking
The Common Criteria
References for Further Study
British Standard 7799
Index