CISSP For Dummies
The bestselling guide to CISSP certification [-- now fully updated for the latest exam!There are currently over 75,000 CISSP certified people out there and thousands take this exam each year. The topics covered in the exam include: network security, security management, systems development, cryptography, disaster recovery, law, and physical security. CISSP For Dummies, 3rd Edition is the bestselling guide that covers the CISSP exam and helps prepare those wanting to take this security exam. The 3rd Edition features 200 additional pages of new content to provide thorough coverage and reflect changes to the exam. Written by security experts and well-known Dummies authors, Peter Gregory and Larry Miller, this book is the perfect, no-nonsense guide to the CISSP certification, offering test-taking tips, resources, and self-assessment tools.Fully updated with 200 pages of new content for more thorough coverage and to reflect all exam changesSecurity experts Peter Gregory and Larry Miller bring practical real-world security expertise CD-ROM includes hundreds of randomly generated test questions for readers to practice taking the test with both timed and untimed versionsCISSP For Dummies, 3rd Edition can lead you down the rough road to certification success!
What people are saying - Write a review
Part I Certification Basics
Part II Domains
Part III The Part of Tens
Part IV Appendixes
A D C B access control systems activities ADCB algorithm application assets asymmetric key attack authentication backup biometric Business Continuity Planning cable Chapter cipher ciphertext CISSP CISSP certification CISSP exam client communications computer crime computer system confidentiality configuration cryptography damage Data Link Layer database decrypt defined developed devices Disaster Recovery Planning discretionary access control domain e-mail encryption ensure evidence example firewall functions hackers hardware identify implemented individual information security integrity Internet Internet Protocol IPSec ISC)≤ key cryptography Layer mandatory access control Mbps mode monitoring object operating system organization organizationís OSI model packets password perform phishing physical plaintext protection protocol public key requirements response Review risk router secret key security policy security professionals server Service specific standard TCSEC threat tion Trusted Computing Base types unauthorized vulnerabilities wireless