By Ronald L. Krutz
* This up to date bestseller beneficial properties new, extra concentrated overview fabric for the major computing device safety certification-the qualified info structures safeguard specialist, or CISSP * the 1st booklet out there to provide entire overview fabric for the data platforms safety Engineering specialist (ISSEP) topic focus, a brand new CISSP credential that is now required for workers and contractors of the nationwide safeguard employer (NSA) and should most probably be followed quickly by means of the FBI, CIA, division of safeguard, and native land defense division * The variety of CISSPs is anticipated to develop by way of fifty percentage in 2004 * The CD-ROM comprises the Boson-powered interactive try out engine perform units for CISSP and ISSEP
Read or Download The CISSP prep guide: mastering the CISSP and ISSEP exams PDF
Similar network security books
IPSec, moment variation is the main authoritative, entire, available, and up to date advisor to IPSec expertise. top gurus disguise all elements of IPSec structure, implementation, and deployment; evaluation vital technical advances given that IPSec was once first standardized; and current new case stories demonstrating end-to-end IPSec safety.
SpringerBriefs current concise summaries of state of the art examine and sensible functions throughout a large spectrum of fields. that includes compact volumes of fifty to a hundred pages (approximately 20,000- 40,000 words), the sequence covers more than a few content material from specialist to educational. Briefs enable authors to offer their rules and readers to soak up them with minimum time funding.
Unified Communications Forensics: Anatomy of universal UC assaults is the 1st booklet to provide an explanation for the problems and vulnerabilities and show the assaults, forensic artifacts, and countermeasures required to set up a safe (UC) setting. This ebook is written by way of best UC specialists Nicholas provide and Joseph W.
Community protection is a really advanced company. The Cisco photos Firewall plays a few very particular services as a part of the protection method. it is important to to be accustomed to many networking and community safety techniques prior to you adopt the CSPFA certification. This booklet is designed for defense pros or networking execs who're drawn to starting the safety certification procedure.
- How to Cheat at Voip Security (How to Cheat)
- Blocking Spam and Spyware For Dummies
- How to cheat at securing your network
- Trustworthy computing : analytical and quantitative engineering evaluation
Extra resources for The CISSP prep guide: mastering the CISSP and ISSEP exams
To perform this task, several Chapter 1 ✦ Security Management Practices formulas and terms have been developed, and the CISSP candidate must fully understand them. The terms and definitions listed in the following section are ranked in the order that they are defined during the Risk Analysis (RA). The Purpose of Risk Analysis The main purpose of performing a Risk Analysis is to quantify the impact of poten tial threats — to put a price or value on the cost of a lost business functionality. The two main results of an RA — the identification of risks and the cost/benefit justifica tion of the countermeasures — are vitally important to the creation of a risk mitiga tion strategy.
Through the “CISSP Prep Guide,” a computer professional can get his or her feet wet in the many disparate domains that comprise the world of information systems security. We’re happy to have played a part. And we’re still crazy about Junior’s cheesecake. Russell Dean Vines December 15, 2003 P Focused Review of the CISSP Ten Domains A R T I ✦ ✦ ✦ ✦ In This Part Chapter 1 Security Management Practices Chapter 2 Access Control Systems Chapter 3 Telecommunications and Network Security Chapter 4 Cryptography Chapter 5 Security Architecture and Models Chapter 6 Operations Security Chapter 7 Applications and Systems Development Chapter 8 Business Continuity Planning and Disaster Recovery Planning Chapter 9 Law, Investigation, and Ethics Chapter 10 Physical Security ✦ ✦ ✦ ✦ 1 C H A P T E R Security Management Practices I n our first chapter, we enter the domain of Security Management.
A CISSP professional will be expected to know the following: ✦ Basic security management concepts ✦ The difference between policies, standards, guidelines, and procedures ✦ Security awareness concepts ✦ Risk management (RM) practices ✦ Data classification levels We will examine the InfoSec domain of Security Management by using the following elements: ✦ Concepts of Information Security Management ✦ The Information Classification process ✦ Security Policy implementation ✦ The roles and responsibilities of Security Administration ✦ Risk Management Assessment tools ✦ Security Awareness training ✦ ✦ ✦ ✦ 4 Part I ✦ Focused Review of the CISSP Ten Domains Throughout the book we have footnotes that will help direct the reader to addi tional study sources.