CISSP Certification Exam Guide
This guide provides detailed coverage of all 10 subject areas tested for the ISC2 exam. There is full CISSP-based coverage of all major security considerations, including public-key infrastructures (PKI), telecommunications security, disaster recovery and physical security. Techn ical discussion sidebars offer depth of understanding not found in other certification books, and practice questions at the end of each chapter help test for comprehension and prepare readers for each subject area of the exam. Easy-to-use map of exam objectives facilitates quick access for exam review, and the book utilizes many drawing and pictures to enhance learning. The accompanying CD features commercial-grade software testing simulations.
46 pages matching document in this book
Results 1-3 of 46
What people are saying - Write a review
We haven't found any reviews in the usual places.
Reasons to Become a CISSP I
CISSPA Brief History
68 other sections not shown
Other editions - View all
access control activities administrator algorithm application attacks audit authentication backup Bell-LaPadula model block cipher cable certification cipher ciphertext CISSP communication company's components computer security confidentiality configured connection covert channels cryptography data link layer database decrypt detection developed devices different types digital signatures disaster recovery document domain e-mail employees enables encryption enforced ensure environment Ethernet evaluation exam facility FDDI firewall frame relay functionality hackers hardware identified implemented individual integrity interface Internet IP address IPSec issues layer methods monitor necessary objects operating system OSI model packet password perform pertaining physical private key procedures properly protection protocol public key public key cryptography request responsible risk analysis router security level security mechanisms security policy server specific standards take place TCSEC threats tion transmission unauthorized usually vulnerabilities