CISSP Certification Exam GuideThis guide provides detailed coverage of all 10 subject areas tested for the ISC2 exam. There is full CISSP-based coverage of all major security considerations, including public-key infrastructures (PKI), telecommunications security, disaster recovery and physical security. Techn ical discussion sidebars offer depth of understanding not found in other certification books, and practice questions at the end of each chapter help test for comprehension and prepare readers for each subject area of the exam. Easy-to-use map of exam objectives facilitates quick access for exam review, and the book utilizes many drawing and pictures to enhance learning. The accompanying CD features commercial-grade software testing simulations. |
Contents
Reasons to Become a CISSP | 2 |
Reasons to Become a CISSP | 3 |
How Do You Become a CISSP? | 8 |
Copyright | |
66 other sections not shown
Other editions - View all
Common terms and phrases
access control activities actually administrator algorithm application attacks audit authentication backup Bell-LaPadula model block cipher buffer overflows cable cipher CISSP communication company's components computer crimes confidential configured connection covert channels cryptography data link data link layer database decrypt detection developed devices different types digital signatures disaster recovery domain e-mail employees enables encryption enforcement ensure environment Ethernet evidence facility FDDI firewall frame relay functionality hackers hardware identified implemented individual integrity interface Internet intruder IP address IPSec issues layer methods monitoring necessary network layer objects one-way function operating system OSI model packet password perform physical private key procedures properly protection protocol public key request responsible risk analysis router security level security mechanisms security policy specific standards switches take place threats tion transmission unauthorized usually vendor vulnerabilities