The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry’s first and only CBK®, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as the basis for (ISC)2’s education and certification programs. 
Unique and exceptionally thorough, the Official (ISC)2®Guide to the CISSP®CBK®provides a better understanding of the CISSP CBK ― a collection of topics relevant to information security professionals around the world. Although the book still contains the ten domains of the CISSP, some of the domain titles have been revised to reflect evolving terminology and changing emphasis in the security professional’s day-to-day environment. The ten domains include information security and risk management, access control, cryptography, physical (environmental) security, security architecture and design, business continuity (BCP) and disaster recovery planning (DRP), telecommunications and network security, application security, operations security, legal, regulations, and compliance and investigations. 
Endorsed by the (ISC)2, this valuable resource follows the newly revised CISSP CBK, providing reliable, current, and thorough information. Moreover, the Official (ISC)2®Guide to the CISSP® CBK® helps information security professionals gain awareness of the requirements of their profession and acquire knowledge validated by the CISSP certification. 
The book is packaged with a CD that is an invaluable tool for those seeking certification. It includes sample exams that simulate the actual exam, providing the same number and types of questions with the same allotment of time allowed. It even grades the exam, provides correct answers, and identifies areas where more study is needed.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
INFORMATION SECURITY AND RISK MANAGEMENT 
Introduction 
The Business Case for Information Security Management 
Core Information Security Principles: Availability, Integrity, 
Information Security Management Governance 
Organizational Behavior 
Security Awareness, Training, and Education 
Risk Management 
Ethics 
Data Classification Policy 
Data Handling Policy 
References 
Other References 
Sample Questions 
 ACCESS CONTROL 
Introduction 
Definitions and Key Concepts 
Access Control Categories and Types 
Access Control Threats 
Access to Systems 
Access to Data 
Intrusion Detection and Prevention Systems 
Access Control Assurance 
References. 
Sample Questions 
 CRYPTOGRAPHY 
Introduction 
Key Concepts and Definitions 
Encryption Systems 
Message Integrity Controls 
Digital Signatures 
Encryption Management 
Cryptanalysis and Attacks 
Encryption Usage 
References 
Sample Questions 
 PHYSICAL (ENVIRONMENTAL) SECURITY 
Introduction 
Site Location 
The Layered Defense Model 
Information Protection and Management Services 
Summary 
References 
Sample Questions 
 SECURITY ARCHITECTURE AND DESIGN  
Introduction 
Security Architecture and Design Components and Principles 
Security Models and Architecture Theory 
Security Product Evaluation Methods and Criteria 
Sample Questions 
 BUSINESS CONTINUITY AND DISASTER RECOVERY PLANNING 
Introduction 
Organization of the BCP/DRP Domain Chapter 
Terminology 
Appendix A: Addressing Legislative Compliance within Business Continuity Plans 
 TELECOMMUNICATIONS AND NETWORK SECURITY 
Introduction 
Basic Concepts 
Layer 1: Physical Layer 
Layer 2: Data-Link Layer 
Layer 3: Network Layer 
Layer 4: Transport Layer 
Layer 5: Session Layer 
Layer 6: Presentation Layer 
Layer 7: Application Layer 
Trivial File Transfer Protocol (TFTP) 
General References 
Sample Questions 
Endnotes 
 APPLICATION SECURITY 
Domain Description and Introduction 
Applications Development and Programming Concepts and Protection 
Audit and Assurance Mechanisms 
Malicious Software (Malware) 
The Database and Data Warehousing Environment 
Web Application Environment 
Summary 
References 
 OPERATIONS SECURITY 
Introduction 
Privileged Entity Controls 
Resource Protection 
Continuity of Operations 
Change Control Management 
Summary 
References 
Sample Questions 
 LEGAL, REGULATIONS, COMPLIANCE AND INVESTIGATIONS 
Introduction 
Major Legal Systems 
Information Technology Laws and Regulations 
Incident Response 
Computer Forensics 
Conclusions 
References 
Sample Questions 
 ANSWERS TO SAMPLE QUESTIONS 
 CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP®) CANDIDATE INFORMATION BULLETIN 
 GLOSSARY  
INDEX
Book by None
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: BookHolders, Towson, MD, U.S.A.
Condizione: Poor. [ No Hassle 30 Day Returns ][ Ships Daily ] [ Underlining/Highlighting: NONE ] [ Writing: NONE ] [ Broken Seams: YES ] second edition. Codice articolo 5657998
Quantità: 1 disponibili
Da: Once Upon A Time Books, Siloam Springs, AR, U.S.A.
hardcover. Condizione: Good. This is a used book in good condition and may show some signs of use or wear . This is a used book in good condition and may show some signs of use or wear . Codice articolo mon0001230541
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Hardcover. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 3.7. Codice articolo G0849382319I4N00
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. 2nd Edition. Used book that is in clean, average condition without any missing pages. Codice articolo 5227896-6
Quantità: 3 disponibili
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
Hardback. Condizione: Good. The book has been read but remains in clean condition. All pages are intact and the cover is intact. Some minor wear to the spine. Codice articolo GOR006246063
Quantità: 2 disponibili
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
Hardback. Condizione: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Codice articolo GOR002537342
Quantità: 1 disponibili
Da: AwesomeBooks, Wallingford, Regno Unito
Condizione: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. . Codice articolo 7719-9780849382314
Quantità: 2 disponibili
Da: Bahamut Media, Reading, Regno Unito
Condizione: Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee. Codice articolo 6545-9780849382314
Quantità: 2 disponibili
Da: HPB-Ruby, Dallas, TX, U.S.A.
hardcover. Condizione: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority! Codice articolo S_431786664
Quantità: 1 disponibili
Da: Better World Books Ltd, Dunfermline, Regno Unito
Condizione: Very Good. 2nd Edition. Ships from the UK. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 12941049-75
Quantità: 1 disponibili