Summary
Get complete coverage of the latest release of the Certified Information Systems Security Professional (CISSP) exam inside this comprehensive, fully updated resource. Written by the leading expert in IT security certification and training, this authoritative guide covers all 10 CISSP exam domains developed by the International Information Systems Security Certification Consortium (ISC2). You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CISSP exam with ease, this definitive volume also serves as an essential on-the-job reference. COVERS ALL 10 CISSP DOMAINS: Information security and risk management Access control Security architecture and design Physical and environmental security Telecommunications and network security Cryptography Business continuity and disaster recovery planning Legal regulations, compliance, and investigations Application security Operations security THE CD-ROM FEATURES: Hundreds of practice exam questions Video training excerpt from the author E-book Shon Harris, CISSP, is a security consultant, a former member of the Information Warfare unit in the Air Force, and a contributing writer to Information Security Magazine and Windows 2000 Magazine. She is the author of the previous editions of this book.
Author Biography
Shon Harris, (San Antonio, TX) MCSE, CISSP, is a security consultant who provides security assessments and analysis, vulnerability testing, and solutions to a wide range of businesses. Harris was a member of the Information Warfare unit in the Air Force, which performs military base assessments and 'red-teaming' activities during aggressor exercises. Harris is a contributing writer to Information Security Magazine and Windows 2000 magazine. She also teaches networking and security classes at different local colleges.
Table of Contents
Chapter 1. Becoming a CISSP; Chapter 2. Security Trends; Chapter 3. Information Security and Risk Management; Chapter 4. Access Control; Chapter 5. Security Architecture and Design; Chapter 6. Physical and Environmental Security; Chapter 7. Telecommunications and Network Security; Chapter 8. Cryptography; Chapter 9. Business Continuity and Disaster Recovery; Chapter 10. Legal, Regulations, Compliance, and Investigations; Chapter 11. Application Security; Chapter 12. Operations Security; Appendix A. Security Content Automation Protocol Overview; Appendix B. About the CD-ROM; Glossary; Index