Free Shipping in the UK on over 5 million books in stock
Official (ISC)2 (R) Guide to the ISSAP (R) CBK By (ISC)^2 Corporate

Official (ISC)2 (R) Guide to the ISSAP (R) CBK

Out of Stock
£37.99
Assures competence of the six major domains of the Information Systems Security Architecture Professional (ISSAP) Concentration. This title enables ISSAP candidates to understand the key concepts and requirements within the ISSAP CBK.
Only 0 left

Official (ISC)2 (R) Guide to the ISSAP (R) CBK Summary


Official (ISC)2 (R) Guide to the ISSAP (R) CBK by (ISC)^2 Corporate

Candidates for the CISSP-ISSAP (R) professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP (R) CBK (R), but also the ability to apply this in-depth knowledge to develop a detailed security architecture that meets all requirements.

Supplying an authoritative review of the key concepts and requirements of the ISSAP (R) CBK (R), the Official (ISC)2 (R) Guide to the ISSAP (R) CBK (R) provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Requirements Analysis, Access Control, Cryptography, Physical Security, BCP/DRP, and Telecommunications and Network Security.

  • Endorsed by the (ISC)2 (R)
  • Follows the newly revised CISSP-ISSAP (R) CBK (R)
  • Reflects the evolving terminology and changing requirements for security professionals

With chapters written by those shaping this relatively new and rapidly developing field, this book is the only officially endorsed guide to the CISSP-ISSAP (R) CBK (R). Read it, study it, and refer to it often as it will help improve your chances of achieving certification the first time around. Following certification it will serve as an authoritative reference for constructing architectures that are compliant with the latest security requirements.

Why buy from World of Books

Our excellent value books literally don't cost the earth
Free delivery in the UK
Read more here
Every used book bought is one saved from landfill

Official (ISC)2 (R) Guide to the ISSAP (R) CBK Reviews


(ISC)2 is pleased to offer the first Official (ISC)2 (R) Guide to the ISSAP (R) CBK (R). This book will review and deepen your knowledge of security architecture, covering each of the six domains contained in the CISSP-ISSAP (R) CBK (R).
-W. Hord Tipton, CISSP-ISSAP, CAP, CISA, Executive Director (ISC)2 (R)

About (ISC)^2 Corporate


About the Authors: Alex Golod, CISSP, is a senior security consultant with 29 years of experience for one of the Fortune 100 IT firms. He has focused the last 12 years of his career in information security. Alex's many responsibilities include architecture, engineering, and operations of security solutions. His broad area of expertise covers application, network and data security, as well as risk analysis and mitigation. Paul Baker, CPP, is a security manager with more than 30 years of extensive experience in all phases of law enforcement and industrial security. He holds a Doctorate in Strategic Leadership from Regent University, along with a Master of Science in Criminal Justice from Troy University, and is a Certified Protection Professional (CPP). Dr. Baker spent 6 years in the U.S. Marine Corps and has retired from the Maryland State Police. Dr. Baker is currently employed as a senior security manager for one of the top ten banks in the Washington, D.C, area. Dr. Baker is also an adjunct professor, teaching parttime for the University of Maryland University College in homeland security and for Southwestern College in security management. Robert B. Batie, Jr., CISSP-ISSEP, ISSAP, ISSMP, CISM, CAP, has over 20 years of experience in communication security and information assurance. He is a senior principal systems engineer at Raytheon NCS, in St. Petersburg, FL. He is a Raytheon Author, Inventor and Technical Honoree, as well as a contributing author for the Official Guide to the CISSP-ISSEP CBK. He has published articles in the CSI Journal, Alert Newsletter and presented at Raytheon symposiums, the CSI Conferences, and the International Biometric Conference. He is an active member of (ISC)2. Bob has a Master's of Science in Computer Systems Management from the University of Maryland and is currently working on a Ph.D. at Nova Southeastern University. Gilbert Held graduated from Pennsylvania Military College with a B.S. in electrical engineering; he also has earned an MSEE degree from New York University and an MSTM and M.B.A. from The American University. He spent 27 years in the U.S. Army and retired as a Lieutenant Colonel. Gil was the Chief of Data Communications for the U.S. Post Office of Personal Management for 20 years. He also designed, acquired, and constructed the OPM's Web presence and received the Directors Award for his efforts. Gil has written over 100 technical books that have exceeded over a million copies, over 500 technical articles on personal computing and data communications and business, and taught 14 different graduate level courses. He has also served as the Editor-in-Chief of the Wiley International journal of Network Management and was selected by the Vice President of the United States to represent the United States at the Jerusalem Conference on Information Technology. Mark J. Makowski, CISSP-ISSAP, is a security architect who has worked in IT for more than 29 years. A graduate of Lawrence Technological University, Mark began his career as a field engineer at Burrough's Corporation in the early 1980s. In the mid-1990s, Mark began engineering tools to help secure UNIX servers for EDS customers. Since then, Mark has been responsible for developing security architectures across a broad range of technologies and industries. Currently, he is helping engineer enterprise services security offerings at a technology company operating in more than 170 countries around the globe. Mark, a member of the Motor City Chapter of ISSA, lives in the Detroit area. Kelley Okolita is a Principal Consultant and Director of Business Continuity and Disaster Recovery for Hanover Insurance in Rhode Island. She built a new contingency program that cost less than industry peers. Within the first year she also renegotiated a hostile vendor contract saving the firm $500,000 a year and reducing the recovery timeline by 80% for time sensitive applications and added business recovery capabilities. Kelley has also held key roles in Fidelity Investments as Director of Risk Management, where she was responsible for the recovery and business contingency efforts for roughly one third of the business operations and previously as Director of Corporate Contingency Planning. While in this role, Kelley spent 9 weeks in New Jersey supporting the recovery efforts of Fidelity New York operations from the events of September 11th. She joined Fidelity in 1976 and has more than 20 years of experience in disaster recovery and business contingency planning both from a data center perspective and the business perspective. Through the years she has supported a number of business recoveries, both large and small. Kelley is an MBCP (Master Business Continuity Planner) and is a member of the Board of Directors for Disaster Recovery Institute International. Sean M. Price, CISA, CISSP, is an independent security consultant and researcher living in northern Virginia. Over the last 15 years he has specialized in designing and evaluating organizational information assurance programs and system security architectures. His research interests include access control, insider threat, information flows, and applications of artificial intelligence to information assurance problems. Sean's prior publications include book chapters for the Information Security Management Handbook series and the Official (ISC) 2Guide to the CISSP CBK. A number of his articles and papers have appeared in peer-reviewed journals and conferences proceedings. Industry publications include the IEEE Computer Magazine, ISSA Journal, IA newsletter, and ISACA J-Online. You can reach him at sean.price@sentinel-consulting.com.

Table of Contents


Introduction
Access Control Systems and Methodologies; Sean Price
Cryptography; Alex Golod and Mark Makowski
Physical Security Integration; Paul Baker
Requirements Analysis and Security Standards and Guidelines Criteria; Robert Batie
Technology-Related Business Continuity Planning and Disaster Recovery Planning; Kelley Okolita
Telecommunications and Network Security; Gilbert Held
Answers to Sample Questions
Index

Additional information

GOR008859470
Official (ISC)2 (R) Guide to the ISSAP (R) CBK by (ISC)^2 Corporate
(ISC)^2 Corporate
ISC2 Press
Used - Very Good
Hardback
Taylor & Francis Inc
2010-11-01
522
1439800936
9781439800935
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us.