Official (ISC)2 Guide to the SSCP CBK (
This item is unavailable.
We will email you if this item comes back into stock.
|Format:||Hardback, 608 pages|
|Other Information: ||25 black & white illustrations, 10 black & white tables|
|Published In: ||United Kingdom, 27 April 2007|
Written by a team of Certified Information Systems Security Professionals from the International Information Systems Security Certification Consortium, this book prepares SSCP candidates for the exam by providing an inclusive, one-stop guide to all SSCP exam topics. It focuses on security practices, roles, and responsibilities as defined by IS industry experts. CCSP certification can enhance an IS career and provide added credibility. The guide covers the seven CCSP information security test domains as per the Common Body of Knowledge (CBK). The domains consist of: Access Control; Administration; Audit and Monitoring; Risk, Response and Recovery; Cryptography; Data Communications; and Malicious Code. Contesti; Diana-Lynn Dofasco, Inc.,Andre; Douglas ,Waxvik; Eric ,Gaddy; Benjamin H. ,
Table of Contents
ACCESS CONTROLS Access Controls in Terms of Subjects Access Controls in Terms of Objects Authentication Implementation Access Control Concepts SECURITY OPERATIONS AND ADMINISTRATION Security Administration Change Management Concepts Systems Development Life Cycle (SDLC) Organization Security Evaluation and Assistance User Security Awareness and Education Code of Ethics Security Infrastructure Evaluation Tools Security Policy Administration Certification and Accreditation Process Concepts Security Best Practices Implementation ANALYSIS AND MONITORING Principles, Practices and Mechanisms Audits Monitoring Systems Analysis of Exploits RISK, RESPONSE, AND RECOVERY Risk Management Process Security Assessments Incident Handling Analysis The Business Continuity Plan (BCP) The Disaster Recovery Plan (DRP) CRYPTOGRAPHY Business and Security Requirements for Cryptography Principles of Certificates and Key Management Secure Protocols NETWORKS AND TELECOMMUNICATIONS Business and Security Requirements Remote Access Architecture Firelwalls Networks Wireless MALICIOUS CODE Viruses, Worms and Trojan Horses, Virus Activity Trap Doors and Back Doors Virus Hoaxes and Myths Characteristics of Malicious Code Appropriate Security Measures
About the Author
Hamilton, Ontario, Canada CitiFinancial, Oak Hill, Virginia, USA
|Publisher: ||Auerbach Publishers Inc.|
|Dimensions: ||23.0 x 15.0 x 3.0 centimeters (1.02 kg)|