Cart
Free Shipping in Australia
Proud to be B-Corp

The CISSP Prep Guide Ronald L. Krutz

The CISSP Prep Guide By Ronald L. Krutz

The CISSP Prep Guide by Ronald L. Krutz


$39.99
Condition - Good
Only 1 left

Summary

The Certified Information Systems Security Professional (CISSP) is the industry standard test for IT security professionals administered by ISC2.

The CISSP Prep Guide Summary

The CISSP Prep Guide by Ronald L. Krutz

The Gold Edition has been updated to include CISSP bonus questions never before published and advanced question and answer tutorial. The CD-ROM contains 660 questions of which 360 have never before been available electronically. All questions have been designed with Boson, the premier interactive test engine for technical books in the industry. Authors are experts in the security certification field and have particular expertise in the CISSP Exam.

About Ronald L. Krutz

RONALD L. KRUTZ is the Senior Information Security Consultant for Corbett Technologies, specializing in information assurance appraisal methodologies. He is a lead instructor for the CISSP CBK review seminars and former faculty R&D Director at Carnegie Mellon University Research Institute. He holds a PhD in computer engineering, is a registered professional engineer, and is a CISSP. He is the author of four previous Wiley books, including The CISSP Prep Guide. RUSSELL DEAN VINES is President of The RDV Group, a New York-based security services firm. Previously, he was consulting manager, Security Services, Realtech Systems. Vines has been involved in computer security for fifteen years and has helped create the security design and architecture for Fortune 1000 companies worldwide, and consults regularly for the U.S. Government and the Department of Defense. He is a certified CISSP and CCNA, MCSE, MCNE, and NSA/IAM professional.

Table of Contents

Acknowledgments.Foreword.Introduction.About the Authors.Chapter 1. Security Management Practices.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 2. Access Control Systems.Rationale.Controls.Identification and Authentication.Some Access Control Issues.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 3. Telecommunications and Network Security.Our Goals.Domain Definition.Management Concepts.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 4. Cryptography.Introduction.Cryptographic Technologies.Secret Key Cryptography (Symmetric Key).Public (Asymmetric) Key Cryptosystems.Approaches to Escrowed Encryption.Internet Security Applications.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 5. Security Architecture and Models.Security Architecture.Assurance.Information Security Models.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 6. Operations Security.Our Goals.Domain Definition.Controls and Protections.Monitoring and Auditing.Threats and Vulnerabilities.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 7. Applications and Systems Development.The Software Life Cycle.Development Process.The Software Capability Maturity Model (CMM).Object-Oriented Systems.Artificial Intelligence Systems.Database Systems.Application Controls.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 8. Business Continuity Planning and Disaster Recovery Planning.Our Goals.Domain Definition.Business Continuity Planning.Disaster Recovery Planning.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 9. Law, Investigation, and Ethics.Types of Computer Crime.Law.Investigation.Liability.Ethics.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 10. Physical Security.Our Goals.Domain Definition.Threats to Physical Security.Controls for Physical Security.Sample Questions.Bonus Questions.Advanced Sample Questions.Appendix A: A Process Approach to HIPAA Compliance through a HIPAA-CMM.Background.HIPAA Security Requirements Mappings to PAs.HPAs.Defining and Using the HIPAA-CMM.Conclusion.References.Appendix A: HIPAA-CMM PA Overview.Appendix B: Glossary (SSE-CMM v2.0).Appendix C: The Ideal Approach to Process Improvement.Appendix D: SSE-CMM MAPPINGS and General Considerations.Appendix B: The NSA InfoSec Assessment Methodology.History of the NIPC.About the ISSO.The InfoSec Assessment Methodology.PDD#63.Appendix C: The Case for Ethical Hacking.Rationale.Roles and Responsibilities.Implementation.Summary.Appendix D: The Common Criteria.Common Criteria: Launching the International Standard.Glossary.For More Information.Appendix E: BS7799.Appendix F: HIPAA Updates.Scope.Title II Administrative Simplification.Conclusion.Appendix G: References for Further Study.Web Sites.Appendix H: Answers to Sample and Bonus Questions.Chapter 1A--Security Management Practices.Chapter 2A--Access Control Systems and Methodology.Chapter 3A--Telecommunications and Network Security.Chapter 4A--Cryptography.Chapter 5A--Security Architecture and Models.Chapter 6A--Operations Security.Chapter 7A--Applications and Systems Development.Chapter 8A--Business Continuity PlanningA--Disaster Recovery Planning.Chapter 9A--Law, Investigation, and Ethics.Chapter 10A--Physical Security.Appendix I: Answers to Advanced Sample Questions.Chapter 1A--Security Management Practices.Chapter 2A--Access Control Systems and Methodology.Chapter 3A--Telecommunications and Network Security.Chapter 4A--Cryptography.Chapter 5A--Security Architecture and Models.Chapter 6A--Operations Security.Chapter 7A--Applications and Systems Development.Chapter 8A--Business Continuity PlanningA--Disaster Recovery Planning.Chapter 9A--Law, Investigation, and Ethics.Chapter 10A--Physical Security.Notes.Appendix J: What's on the CD-ROM.Glossary of Terms and Acronyms.Index.

Additional information

GOR005374418
9780471268024
047126802X
The CISSP Prep Guide by Ronald L. Krutz
Used - Good
Hardback
John Wiley and Sons Ltd
20021031
976
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - The CISSP Prep Guide