The CISSP and CAP Prep Guide


Book Description

The Certified Information Systems Security Professional (CISSP) is the industry standard test on IT security. This guide helps security professionals prepare for the exam while providing a reference on key information security areas.




The CISSP Prep Guide


Book Description

This updated bestseller features new, more focused review material for the leading computer security certification-the Certified Information Systems Security Professional, or CISSP The first book on the market to offer comprehensive review material for the Information Systems Security Engineering Professional (ISSEP) subject concentration, a new CISSP credential that's now required for employees and contractors of the National Security Agency (NSA) and will likely be adopted soon by the FBI, CIA, Department of Defense, and Homeland Security Department The number of CISSPs is expected to grow by fifty percent in 2004 The CD-ROM includes the Boson-powered interactive test engine practice sets for CISSP and ISSEP




The CISSP?and CAP Prep Guide


Book Description

This follow-on edition to The CISSP Prep Guide: Mastering CISSP and ISSEP offers value-add coverage not featured anywhere else! You'll prepare for passing CISSP with a revised review of each of the ten CISSP domains, updated to reflect current thinking/technology, especially in the areas of cyber-terrorism prevention and disaster recovery. You'll also cover CAP, a major section of the ISSEP that has been elevated from its status as part of an advanced concentration to its own certification. The accompanying CD-ROM contains revised test questions to make your preparation complete. Order your copy today and make your exam preparation complete!




Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®


Book Description

The Official (ISC)2 Guide to the CISSP-ISSEP CBK provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certifica




Web Commerce Security


Book Description

Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification.




Official (ISC)2® Guide to the CAP® CBK®


Book Description

Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP) Common Body of Knowledge (CBK) and NIST SP 800-37, the Official




The CEH Prep Guide


Book Description

A guide for keeping networks safe with the Certified Ethical Hacker program.




Official (ISC)2 Guide to the CISSP CBK


Book Description

As a result of a rigorous, methodical process that (ISC) follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC) conducts this process on a regular basis to ensure that the examinations and




Official (ISC)2 Guide to the CISSP CBK


Book Description

With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company's reputation, violating a consumer's privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for information security professionals to stay up to da




Managing Risk in Information Systems


Book Description

This second edition provides a comprehensive overview of the SSCP Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Written by industry experts, and using a wealth of examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk. It provides a modern and comprehensive view of information security policies and frameworks; examines the technical knowledge and software skills required for policy implementation; explores the creation of an effective IT security policy framework; discusses the latest governance, regulatory mandates, business drives, legal considerations, and much more. --