CISSP:CertifiedInformationSystemsSecurityProfessionalStudyGuide,4thEditionCISSP:鉴定信息系统安全性专业研究指南第四版

分類: 图书,进口原版书,计算机 Computers & Internet ,
作者: James Michael Stewart著
出 版 社:
出版时间: 2008-7-1字数:版次: 1页数: 841印刷时间: 2008/07/01开本: 16开印次: 1纸张: 胶版纸I S B N : 9780470276884包装: 平装编辑推荐
作者介绍:James Michael Stewart
James Michael Stewart, CISSP, has been writing and training for more than 14 years, with a current focus on security. He has taught dozens of CISSP training courses, not to mention numerous sessions on Windows security and the Certified Ethical Hacker certification. He is the author of several books and courseware sets on security certification, Microsoft topics, and network administration. More information about Michael can be found at his website: www.impactonline.com
内容简介
Building on the popular Sybex Study Guide approach, CISSP®: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% coverage of the CISSP Body of Knowledge exam objectives. Find clear and concise information on crucial security topics, practical examples and insights drawn from real-world experience, and cutting-edge exam preparation software, including two full-length bonus exams and electronic flashcards. Prepare yourself by reviewing the key exam topics, including access control, application security, business continuity and disaster recovery planning, cryptography; information security and risk management, and security architecture and design telecommunications and network security.
目录
Introduction.
Assessment Test.
Chapter 1: Accountability and Access Control.
Chapter 2: Attacks and Monitoring.
Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure.
Chapter 4: Communications Security and Countermeasures.
Chapter 5: Security Management Concepts and Principles.
Chapter 6: Asset Value, Policies, and Roles.
Chapter 7: Data and Application Security Issues.
Chapter 8: Malicious Code and Application Attacks.
Chapter 9: Cryptography and Private Key Algorithms.
Chapter 10: PKI and Cryptographic Applications.
Chapter 11: Principles of Computer Design.
Chapter 12: Principles of Security Models.
Chapter 13: Administrative Management.
Chapter 14: Auditing and Monitoring.
Chapter 15: Business Continuity Planning.
Chapter 16: Disaster Recovery Planning.
Chapter 17: Law and Investigations.
Chapter 18: Incidents and Ethics.
Chapter 19: Physical Security Requirements.
Appendix: About the Companion CD.
Glossary.
Index.