CISSP All-in-One Exam Guide, Third Edition
The Third Edition of this proven All-in-One exam guide provides total coverage of the CISSP certification exam, which has again been voted one of the Top 10 IT certifications in 2005 by CertCities. Revised and updated using feedback from Instructors and students, learn security operations in the areas of telecommunications, cryptography, management practices, and more. Plan for continuity and disaster recovery. Update your knowledge of laws, investigations, and ethics. Plus, run the CD-ROM and practice with more than 500 all new simulated exam questions. Browse the all new electronic book for studying on the go. Let security consultant and author Shon Harris lead you to successful completion of the CISSP.
20 pages matching related:ISBN0072257121 in this book
What people are saying - Write a review
CISSP Allinone Exam GuideUser Review - jwilli7150 - Overstock.com
Rests on my bookshelf with the rest of my CISSP books. Very well put together and sturdy book. Has proven to be a very valuable reference guide. Read full review
Other editions - View all
access control activities administrator algorithm application attacker audit authentication backup Bell-LaPadula model block cipher brute force attack cable certification cipher ciphertext CISSP communicate company's components confidentiality configured connection countermeasures covert channels cryptography data link layer database decrypt detect developed devices digital signature domain e-mail employees encryption ensure environment Ethernet evaluated exam example facility Figure firewall frame relay functionality goals hackers hardware hashing identify implemented individual integrity Internet IP address IPSec issues layer memory monitor necessary objects operating system OSI model packet password perform private key procedures properly protection protocol public key request Response risk analysis router security level security policy sends server specific standard switch symmetric key take place TCSEC threats tion traffic transmission trusted usually vendor vulnerabilities wireless