Please take a moment to complete this survey below

Library's collection Library's IT development Cancel

All in one CISSP : exam guide 7th ed.

Author
  • Harris, Shon
Additional Author(s)
-
Publisher
New York: McGraw-Hill Education, 2016
Language
English
ISBN
9780071849272
Series
Subject(s)
  • COMPUTER NETWORKS-EXAMINATIONS-STUDY GUIDES
  • ELECTRONIC DATA-PROSESSING PERSONNEL-CERTIFICATION
Notes
  • Appendix: p. 1213-1271
  • CD ROM 00314/18
  • Glossary: p. 1273-1289
. . Index: p. 1291-1341
Abstract
A fully revised edition of the #1 CISSP training resource
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all exam domains, as well as the new 2015 CISSP Common Body of Knowledge developed by the International Information Systems Security Certification Consortium (ISC)2®. CISSP All-in-One Exam Guide, Seventh Edition features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Written by leading experts in IT security certification and training, this completely up-to-date self-study system helps you pass the exam with ease and also serves as an essential on-the-job reference.
Covers all 8 CISSP domains:
• Security and risk management
• Asset security
• Security engineering
• Communication and network security
• Identity and access management
• Security assessment and testing
• Security operations
• Software development security
Electronic content includes:
• 1400+ practice questions, including new hot spot and drag-and-drop questions
• Complete PDF copy of the book
Physical Dimension
Number of Page(s)
xxxiv, 1341 p.
Dimension
24 cm.
Other Desc.
ill.
Summary / Review / Table of Content
Cover13; --
Contents --
Foreword --
Acknowledgments --
Introduction --
Chapter 1 Becoming a CISSP --
Why Become a CISSP? --
The CISSP Exam --
CISSP: A Brief History --
How Do You Become a CISSP? --
Recertification Requirements --
What Does This Book Cover? --
Tips for Taking the CISSP Exam --
How to Use This Book --
Questions --
Answers --
Chapter 2 Security Trends --
How Security Became an Issue --
Areas of Security --
Information Warfare --
Evidence of the Evolution of Hacking --
How Are Nations Affected? --
How Are Companies Affected? --
The U.S. Government8217;s Actions --
So What Does This Mean to Us? --
Hacking and Attacking --
Management --
Internet and Web Activities --
Two-Tier Architecture --
Database Roles --
A Layered Approach --
Security at Different Layers --
An Architectural View --
A Layer Missed --
Bringing the Layers Together --
Politics and Laws --
Education --
Summary --
Chapter 3 Information Security and Risk Management --
Security Management --
Security Management Responsibilities --
The Top-Down Approach to Security --
Security Administration and Supporting Controls --
Fundamental Principles of Security --
Availability --
Integrity --
Confidentiality --
Security Definitions --
Organizational Security Model --
Security Program Components --
Business Requirements: Private Industry vs. Military Organizations --
Information Risk Management --
Who Really Understands Risk Management? --
Information Risk Management Policy --
Risk Management Team --
Risk Analysis --
Risk Analysis Team --
Value of Information and Assets --
Costs That Make Up the Value --
Identifying Threats --
Quantitative Risk Analysis --
Qualitative Risk Analysis --
Quantitative vs. Qualitative --
Protection Mechanisms --
Putting It Together --
Total Risk vs. Residual Risk --
Handling Risk --
Policies, Standards, Baselines, Guidelines, and Procedures --
Security Policy --
Standards --
Baselines --
Guidelines --
Procedures --
Implementation --
Information Classification --
Private Business vs. Military Classifications --
Classification Controls --
Layers of Responsibility --
Data Owner --
Data Custodian --
System Owner --
Security Administrator --
Security Analyst --
Application Owner --
Supervisor --
Change Control Analyst --
Data Analyst --
Process Owner --
Solution Provider --
User --
Product Line Manager --
Why So Many Roles? --
Personnel --
Structure --
Hiring Practices --
Employee Controls --
Termination --
Security-Awareness Training --
Different Types of Security-Awareness Training --
Evaluating the Program --
Specialized Security Training --
Summary --
Quick Tips --
Questions --
Answers --
Chapter 4 Access Controls --
Access Controls Overview --
Security Principles --
Availability --
Integrity --
Confidentiality --
Identification, Authentication, and Authorization --
Identification and Authentication --
Authorization --
Access Control Models --
Discretionary Access Control --
Mandatory Access Control --
Role-Based Access Control --
Access Control Techniques and Technologies --
Rule-Based.
Exemplar(s)
# Accession No. Call Number Location Status
1.00313/18005.8 Har CLibrary - 7th FloorAvailable

Similar Collection

by author or subject