
- 600 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Official (ISC)2® Guide to the ISSAP® CBK
About this book
Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.
Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the Official (ISC)2® Guide to the ISSAP® CBK®, Second Edition provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations.
Newly Enhanced Design – This Guide Has It All!
- Only guide endorsed by (ISC)2
- Most up-to-date CISSP-ISSAP CBK
- Evolving terminology and changing requirements for security professionals
- Practical examples that illustrate how to apply concepts in real-life situations
- Chapter outlines and objectives
- Review questions and answers
- References to free study resources
Read It. Study It. Refer to It Often.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Foreword
- Introduction
- Editors
- Domain 1 - Access Control Systems & Methodology
- Domain 2 - Communications & Network Security
- Domain 3 - Cryptography
- Domain 4 - Security Architecture Analysis
- Domain 5 - Technology Related Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
- Domain 6 - Physical Security Considerations
- Appendix A
- Index