CISSP Guide to Security Essentials
About this book
CISSP GUIDE TO SECURITY ESSENTIALS, Second Edition, provides complete, focused coverage to prepare students and professionals alike for success on the Certified Information Systems Security Professional (CISSP) certification exam. The text opens with an overview of the current state of information security, including relevant legislation and standards, before proceeding to explore all ten CISSP domains in great detail, from security architecture and design to access control and cryptography. Each chapter opens with a brief review of relevant theory and concepts, followed by a strong focus on real-world applications and learning tools designed for effective exam preparation, including key terms, chapter summaries, study questions, hands-on exercises, and case projects. Developed by the author of more than 30 books on information securitythe Second Edition of this trusted text has been updated to reflect important new developments in technology and industry practices, providing an accurate guide to the entire CISSP common body of knowledge.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title
- Statement
- Copyright
- Dedication
- Brief Table of Contents
- Table of Contents
- Introduction
- Lab Requirements
- Ch 1: Information Security and Risk Management
- Ch 2: Access Controls
- Ch 3: Software Development Security
- Ch 4: Business Continuity and Disaster Recovery Planning
- Ch 5: Cryptography
- Ch 6: Legal, Regulations, Investigations, and Compliance
- Ch 7: Security Operations
- Ch 8: Physical and Environmental Security
- Ch 9: Security Architecture and Design
- Ch 10: Telecommunications and Network Security
- Appendix A: The Ten Domains of CISSP Security
- Appendix B: The (ISC)2 Code of Ethics
- Appendix C: Earning the CISSP Certification
- Glossary
- Index
