The CISSP and CAP Prep Guide: Mastering CISSP and CAP
This follow-on edition to The CISSP Prep Guide: Mastering CISSP and ISSEP offers value-add coverage not featured anywhere else! You'll prepare for passing CISSP with a revised review of each of the ten CISSP domains, updated to reflect current thinking/technology, especially in the areas of cyber-terrorism prevention and disaster recovery. You'll also cover CAP, a major section of the ISSEP that has been elevated from its status as part of an advanced concentration to its own certification. The accompanying CD-ROM contains revised test questions to make your preparation complete. Order your copy today and make your exam preparation complete!
What people are saying - Write a review
We haven't found any reviews in the usual places.
Platinum Edition Part II The Certification and Accreditation Professional CAP Credential
Platinum Edition Appendix A Answers to Assessment Questions
Platinum Edition Appendix B Glossary of Terms and Acronyms
Platinum Edition Appendix C The Information System Security Architecture Professional ISSAP Certification
Platinum Edition Appendix D The Information System Security Engineering Professional ISSEP Certification
Other editions - View all
access control activities agency algorithm analysis Answer application architecture attack audit authentication backup Business Continuity Planning Certification and Accreditation cipher ciphertext CISSP client communications Computer Security confidentiality covert channel cryptography cycle database defined detection determine device DIACAP digital signatures disaster recovery DITSCAP documentation encryption ensure Ethernet evaluation example Federal Information FIPS firewall FISMA function hardware identify IEEE impact implementation information security information system security integrity interface Internet IPSec Layer Mbps message digest monitoring NIST NIST SP object operations organization OSI model packet password perform personnel Phase physical plaintext procedures protection Protocol provides public key public-key cryptography responsible router SDLC security controls security engineering security policy security requirements sensitive server specific SSAA standard TCSEC threat tion types unauthorized Validation verify vulnerabilities wireless