Amazon cover image
Image from Amazon.com

CISSP Certified Information Systems Security Professional study guide.

By: Contributor(s): Material type: TextPublication details: Indiana Wiley Publishing, Inc. 2008Edition: Fourth EditionDescription: 841p.; 1CDISBN:
  • 9780470276884
Subject(s): DDC classification:
  • 005.8
Summary: Introduction. Assessment Test. Chapter 1: Accountability and Access Control. Chapter 2: Attacks and Monitoring. Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure. Chapter 4: Communications Security and Countermeasures. Chapter 5: Security Management Concepts and Principles. Chapter 6: Asset Value, Policies, and Roles. Chapter 7: Data and Application Security Issues. Chapter 8: Malicious Code and Application Attacks. Chapter 9: Cryptography and Private Key Algorithms. Chapter 10: PKI and Cryptographic Applications. Chapter 11: Principles of Computer Design. Chapter 12: Principles of Security Models. Chapter 13: Administrative Management. Chapter 14: Auditing and Monitoring. Chapter 15: Business Continuity Planning. Chapter 16: Disaster Recovery Planning. Chapter 17: Law and Investigations. Chapter 18: Incidents and Ethics. Chapter 19: Physical Security Requirements. Appendix: About the Companion CD. Glossary. Index.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
BOOKS KUWAIT TECHNICAL COLLEGE LIBRARY 005.8 St495 2008 c.1 (Browse shelf(Opens below)) Checked out 01.08.2024 00989

Includes index.
Description based on CIP.

Introduction. Assessment Test. Chapter 1: Accountability and Access Control. Chapter 2: Attacks and Monitoring. Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure. Chapter 4: Communications Security and Countermeasures. Chapter 5: Security Management Concepts and Principles. Chapter 6: Asset Value, Policies, and Roles. Chapter 7: Data and Application Security Issues. Chapter 8: Malicious Code and Application Attacks. Chapter 9: Cryptography and Private Key Algorithms. Chapter 10: PKI and Cryptographic Applications. Chapter 11: Principles of Computer Design. Chapter 12: Principles of Security Models. Chapter 13: Administrative Management. Chapter 14: Auditing and Monitoring. Chapter 15: Business Continuity Planning. Chapter 16: Disaster Recovery Planning. Chapter 17: Law and Investigations. Chapter 18: Incidents and Ethics. Chapter 19: Physical Security Requirements. Appendix: About the Companion CD. Glossary. Index.

There are no comments on this title.

to post a comment.