CISSP Practice Exams, Fourth Edition
McGraw-Hill Education
978-1-259-58596-8 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Don’t Let the Real Test Be Your First Test!
This fully updated self-study guide offers complete coverage of all eight CISSP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2®. To reinforce important skills and facilitate retention, every question is accompanied by in-depth explanations for both correct and incorrect answers. Designed to help you pass the test with ease, this book is the ideal companion to the bestselling CISSP All-in-One Exam Guide.
Covers all 8 CISSP domains:
• Security and risk management
• Asset security
• Security engineering
• Communication and network security
• Identity and access management
• Security assessment and testing
• Security operations
• Software development security
CD ICON
Electronic content includes:
• 1000+ multiple-choice practice exam questions
• Hotspot and drag-and-drop practice exam questions
• PDF copy of the complete book
Shon Harris is the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Forces Information Warfare unit, an instructor and an author. She has authored several international bestselling books on information security published by McGraw-Hill and Pearson which has sold over a million copies and have been translated into six languages. Ms. Harris authors academic textbooks, security articles for publication and is a technical editor for Information Security Magazine. Ms. Harris has consulted for a large number of organizations in every business sector (financial, medical, retail, entertainment, utility) and several U.S. government agencies over the last 18 years. Ms. Harris provides high-end, advanced and specialized consulting for organizations globally. She also works directly with law firms as a technical and expert witness on cases that range from patent infringement, criminal investigations, civil lawsuits and she specializes in cryptographic technologies. Ms. Harris has taught information security to a wide range of clients over the last 18 years, some of which have included; West Point, Microsoft, DHS, DoD, DoE, NSA, FBI, NASA, CDC, PWC, DISA, RSA, Visa, Intel, Cisco, Oracle, HP, Boeing, Northrop Grumman, Shell, Verizon, Citi, BoA, HSBC, Morgan Stanley, Symantec, Warner Brothers, Bridgestone, American Express, etc. Ms. Harris was recognized as one of the top 25 women in the Information Security field by Information Security Magazine. Jonathan Ham, CISSP, GSEC, GCIA, GCIH, is an independent consultant who specializes in large-scale enterprise security issues, from policy and procedure, through staffing and training, to scalable prevention, detection, and response technology and techniques. With a keen understanding of ROI and TCO, he has helped his clients achieve greater success for more than 12 years, advising in both the public and private sectors, from small upstarts to the Fortune 500. Jonathan has been commissioned to teach NCIS investigators how to use Snort, performed packet analysis from a facility more than 2000 feet underground, and chartered and trained the CIRT for one of the largest U.S. civilian federal agencies. He is a member of the GIAC Advisory Board and is a SANS instructor teaching their MGT414: SANS Training Program for CISSP Certification course. He is also co-author of Network Forensics: Tracking Hackers through Cyberspace, a textbook published by Prentice-Hall.
Chapter 1: Security and Risk Management
Chapter 2: Asset Security
Chapter 3: Security Engineering
Chapter 4: Communications and Network Security
Chapter 5: Identity and Access Management
Chapter 6: Security Assessment and Testing
Chapter 7: Security Operations
Chapter 8: Software Development Security
Appendices
Appendix A: About the New Question Format
Appendix B: About the CD-ROM
Appendix C: About the Download
Verlagsort | OH |
---|---|
Sprache | englisch |
Maße | 188 x 231 mm |
Gewicht | 652 g |
Themenwelt | Sonstiges ► Geschenkbücher |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Weitere Themen ► Zertifizierung | |
ISBN-10 | 1-259-58596-4 / 1259585964 |
ISBN-13 | 978-1-259-58596-8 / 9781259585968 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich