Official (ISC)2 Guide to the CISSP CBK

Official (ISC)2 Guide to the CISSP CBK

4.11 - 1251 ratings - Source

The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industrya€™s first and only CBKAr, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as the basis for (ISC)2a€™s education and certification programs. Unique and exceptionally thorough, the Official (ISC)2Ar Guide to the CISSPArCBKArprovides a better understanding of the CISSP CBK a€” a collection of topics relevant to information security professionals around the world. Although the book still contains the ten domains of the CISSP, some of the domain titles have been revised to reflect evolving terminology and changing emphasis in the security professionala€™s day-to-day environment. The ten domains include information security and risk management, access control, cryptography, physical (environmental) security, security architecture and design, business continuity (BCP) and disaster recovery planning (DRP), telecommunications and network security, application security, operations security, legal, regulations, and compliance and investigations. Endorsed by the (ISC)2, this valuable resource follows the newly revised CISSP CBK, providing reliable, current, and thorough information. Moreover, the Official (ISC)2Ar Guide to the CISSPAr CBKAr helps information security professionals gain awareness of the requirements of their profession and acquire knowledge validated by the CISSP certification. The book is packaged with a CD that is an invaluable tool for those seeking certification. It includes sample exams that simulate the actual exam, providing the same number and types of questions with the same allotment of time allowed. It even grades the exam, provides correct answers, and identifies areas where more study is needed.... Conferencing (Sametime), as well as commercial services such as: a€c AOL Instant Messaging and ICQ, based on the proprietary Open System for ... by: a€c Choosing a misleading identity upon registration or changing onea#39;s nickname while online a€c Manipulating the directory service (if the ... A different form of confidentiality breach may occur based upon 504 OFFICIAL (ISC)2Ar GUIDE TO THE CISSPAr CBKAr

Title:Official (ISC)2 Guide to the CISSP CBK
Author: Steven Hernandez, CISSP
Publisher:CRC Press - 2006-11-14

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA