Nicht aus der Schweiz? Besuchen Sie lehmanns.de
The CISSP Prep Guide - Ronald L. Krutz, Russell Dean Vines

The CISSP Prep Guide

Buch | Hardcover
976 Seiten
2002 | Gold ed
John Wiley & Sons Inc (Verlag)
978-0-471-26802-4 (ISBN)
CHF 99,90 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
The Certified Information Systems Security Professional (CISSP) is the industry standard test for IT security professionals administered by ISC2.
The Gold Edition has been updated to include CISSP bonus questions never before published and advanced question and answer tutorial. The CD-ROM contains 660 questions of which 360 have never before been available electronically. All questions have been designed with Boson, the premier interactive test engine for technical books in the industry. Authors are experts in the security certification field and have particular expertise in the CISSP Exam.

RONALD L. KRUTZ is the Senior Information Security Consultant for Corbett Technologies, specializing in information assurance appraisal methodologies. He is a lead instructor for the CISSP CBK review seminars and former faculty R&D Director at Carnegie Mellon University Research Institute. He holds a PhD in computer engineering, is a registered professional engineer, and is a CISSP. He is the author of four previous Wiley books, including The CISSP Prep Guide. RUSSELL DEAN VINES is President of The RDV Group, a New York-based security services firm. Previously, he was consulting manager, Security Services, Realtech Systems. Vines has been involved in computer security for fifteen years and has helped create the security design and architecture for Fortune 1000 companies worldwide, and consults regularly for the U.S. Government and the Department of Defense. He is a certified CISSP and CCNA, MCSE, MCNE, and NSA/IAM professional.

Acknowledgments.Foreword.Introduction.About the Authors.Chapter 1. Security Management Practices.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 2. Access Control Systems.Rationale.Controls.Identification and Authentication.Some Access Control Issues.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 3. Telecommunications and Network Security.Our Goals.Domain Definition.Management Concepts.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 4. Cryptography.Introduction.Cryptographic Technologies.Secret Key Cryptography (Symmetric Key).Public (Asymmetric) Key Cryptosystems.Approaches to Escrowed Encryption.Internet Security Applications.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 5. Security Architecture and Models.Security Architecture.Assurance.Information Security Models.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 6. Operations Security.Our Goals.Domain Definition.Controls and Protections.Monitoring and Auditing.Threats and Vulnerabilities.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 7. Applications and Systems Development.The Software Life Cycle.Development Process.The Software Capability Maturity Model (CMM).Object-Oriented Systems.Artificial Intelligence Systems.Database Systems.Application Controls.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 8. Business Continuity Planning and Disaster Recovery Planning.Our Goals.Domain Definition.Business Continuity Planning.Disaster Recovery Planning.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 9. Law, Investigation, and Ethics.Types of Computer Crime.Law.Investigation.Liability.Ethics.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 10. Physical Security.Our Goals.Domain Definition.Threats to Physical Security.Controls for Physical Security.Sample Questions.Bonus Questions.Advanced Sample Questions.Appendix A: A Process Approach to HIPAA Compliance through a HIPAA-CMM.Background.HIPAA Security Requirements Mappings to PAs.HPAs.Defining and Using the HIPAA-CMM.Conclusion.References.Appendix A: HIPAA-CMM PA Overview.Appendix B: Glossary (SSE-CMM v2.0).Appendix C: The Ideal Approach to Process Improvement.Appendix D: SSE-CMM MAPPINGS and General Considerations.Appendix B: The NSA InfoSec Assessment Methodology.History of the NIPC.About the ISSO.The InfoSec Assessment Methodology.PDD#63.Appendix C: The Case for Ethical Hacking.Rationale.Roles and Responsibilities.Implementation.Summary.Appendix D: The Common Criteria.Common Criteria: Launching the International Standard.Glossary.For More Information.Appendix E: BS7799.Appendix F: HIPAA Updates.Scope.Title II Administrative Simplification.Conclusion.Appendix G: References for Further Study.Web Sites.Appendix H: Answers to Sample and Bonus Questions.Chapter 1A--Security Management Practices.Chapter 2A--Access Control Systems and Methodology.Chapter 3A--Telecommunications and Network Security.Chapter 4A--Cryptography.Chapter 5A--Security Architecture and Models.Chapter 6A--Operations Security.Chapter 7A--Applications and Systems Development.Chapter 8A--Business Continuity PlanningA--Disaster Recovery Planning.Chapter 9A--Law, Investigation, and Ethics.Chapter 10A--Physical Security.Appendix I: Answers to Advanced Sample Questions.Chapter 1A--Security Management Practices.Chapter 2A--Access Control Systems and Methodology.Chapter 3A--Telecommunications and Network Security.Chapter 4A--Cryptography.Chapter 5A--Security Architecture and Models.Chapter 6A--Operations Security.Chapter 7A--Applications and Systems Development.Chapter 8A--Business Continuity PlanningA--Disaster Recovery Planning.Chapter 9A--Law, Investigation, and Ethics.Chapter 10A--Physical Security.Notes.Appendix J: What's on the CD-ROM.Glossary of Terms and Acronyms.Index.

Erscheint lt. Verlag 15.11.2002
Zusatzinfo Illustrations
Verlagsort New York
Sprache englisch
Maße 193 x 242 mm
Gewicht 1602 g
Einbandart gebunden
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
ISBN-10 0-471-26802-X / 047126802X
ISBN-13 978-0-471-26802-4 / 9780471268024
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20