Official (ISC)2 Guide to the SSCP CBK
Auerbach (Verlag)
978-0-8493-2774-2 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
The SSCP® certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. If you're serious about becoming a leading tactician at the front lines, the (ISC)²® Systems Security Certified Practitioner (SSCP) certification is an absolute necessity-demanded by cutting-edge companies worldwide, today more than ever before. As a warrior defending an organization's digital assets, a SSCP must demonstrate a high level of competence and understanding of the seven domains of the (ISC)² CBK®. This comprehensive taxonomy of information security topics establishes a common framework of terms and principles that enable security professionals around the world to discuss, debate, and resolve matters pertaining to the industry.
Nowhere else are the seven domains of the CBK embodied more adeptly than in the first edition of the Official (ISC) ²® Guide to the SSCP® CBK®. In a milestone effort by (ISC)², five of the of the world's leading tacticians with hands-on experience in IT security acknowledge the importance of the security implementation process. Armed with practical experience, the authors discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure.
Simply put, the (ISC)² Systems Security Certified Practitioner certification is the most important credential an information security practitioner can have. Through clear descriptions accompanied by numerous tables, easy-to-follow instructions, sample questions, and an entire chapter of self-assessment questions, this book builds a solid, product-independent understanding of information security fundamentals.
The Official (ISC) ²® Guide to the SSCP® CBK®.
Master it, and you'll have the current concepts, widely recognized best practices, and key techniques used by the world's top specialists.
Hamilton, Ontario, Canada CitiFinancial, Oak Hill, Virginia, USA
ACCESS CONTROLS
Access Controls in Terms of Subjects
Access Controls in Terms of Objects
Authentication Implementation
Access Control Concepts
SECURITY OPERATIONS AND ADMINISTRATION
Security Administration
Change Management Concepts
Systems Development Life Cycle (SDLC)
Organization Security Evaluation and Assistance
User Security Awareness and Education
Code of Ethics
Security Infrastructure Evaluation Tools
Security Policy Administration
Certification and Accreditation Process Concepts
Security Best Practices Implementation
ANALYSIS AND MONITORING
Principles, Practices and Mechanisms
Audits
Monitoring Systems
Analysis of Exploits
RISK, RESPONSE, AND RECOVERY
Risk Management Process
Security Assessments
Incident Handling Analysis
The Business Continuity Plan (BCP)
The Disaster Recovery Plan (DRP)
CRYPTOGRAPHY
Business and Security Requirements for Cryptography
Principles of Certificates and Key Management
Secure Protocols
NETWORKS AND TELECOMMUNICATIONS
Business and Security Requirements
Remote Access Architecture
Firelwalls
Networks
Wireless
MALICIOUS CODE
Viruses, Worms and Trojan Horses,
Virus Activity
Trap Doors and Back Doors
Virus Hoaxes and Myths
Characteristics of Malicious Code
Appropriate Security Measures
Erscheint lt. Verlag | 27.4.2007 |
---|---|
Reihe/Serie | ISC2 Press |
Zusatzinfo | 10 Tables, black and white; 25 Illustrations, black and white |
Verlagsort | London |
Sprache | englisch |
Maße | 156 x 234 mm |
Gewicht | 1021 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Weitere Themen ► Zertifizierung | |
ISBN-10 | 0-8493-2774-1 / 0849327741 |
ISBN-13 | 978-0-8493-2774-2 / 9780849327742 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich