Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20
, e.a.

Official (ISC)2 Guide to the ISSAP CBK

Gebonden Engels 2013 9781466579002
Voormalig top 100Totaal 1 dag
Verwachte levertijd ongeveer 15 werkdagen


Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.

Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the 'Official (ISC)2 Guide to the ISSAP® CBK, 2nd Edition' provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations.

Newly Enhanced Design – This Guide Has It All!
- Only guide endorsed by (ISC)2
- Most up-to-date CISSP-ISSAP CBK
- Evolving terminology and changing requirements for security professionals
- Practical examples that illustrate how to apply concepts in real-life situations
- Chapter outlines and objectives
- Review questions and answers
- References to free study resources

Read It. Study It. Refer to It Often.
Build your knowledge and improve your chance of achieving certification the first time around. Endorsed by (ISC)2 and compiled and reviewed by CISSP-ISSAPs and (ISC)2 members, this book provides unrivaled preparation for the certification exam and is a reference that will serve you well into your career. Earning your ISSAP is a deserving achievement that gives you a competitive advantage and makes you a member of an elite network of professionals worldwide.


Trefwoorden:certificering, CISSP, ISSAP
Aantal pagina's:574
Uitgever:CRC Press


Wees de eerste die een lezersrecensie schrijft!



Domain 1: Access Control Systems & Methodology
-Access Control Concepts
-Authentication, Authorization, and Accounting (AAA)
-Access Control Administration and Management Concepts

Domain 2: Communications & Network Security
-Voice and Facsimile Communications
-Network Architecture
-Network Security Design Considerations
-Interoperability and Associated Risks
-Audits and Assessments
-Operating Environment
-Secure Sourcing Strategy

Domain 3: Cryptographic Principles
-Applications of Cryptography
-Vet Proprietary Cryptography & Design Testable Cryptographic Systems
-Computational Overhead & Useful Life
-Key Management
-Key Life Cycle
-Public Key Infrastructure
-Design Validation

Domain 4: Security Architecture Analysis
-Risk Analysis
-Product Assurance Evaluation Criteria
-Assurance through Evaluation
-Architecture Frameworks
-Design Process

Domain 5: Technology Related Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
-Planning Phases and Deliverables
-Risk Analysis
-Business Impact Analysis
-Selecting a Recovery Strategy for Technology
-Bringing It All Together – A Sample "Walk Through" of a DR Plan
-Step by Step Guide for Disaster Recovery Planning for Security Architects

Domain 6: Physical Security Considerations
-Physical Security Policies and Standards
-Physical Security Risks
-Protection Plans

Appendix A: Answers to Review Questions


Managementboek Top 100


Populaire producten



        Official (ISC)2 Guide to the ISSAP CBK