Don't Let the Real Test Be Your First Test!This fully updated self-study guide offers complete coverage of all eight CISSP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2 (R). To reinforce important skills and facilitate retention, every question is accompanied by in-depth explanations for both correct and incorrect answers. Designed to help you pass the test with ease, this book is the ideal companion to the bestselling CISSP All-in-One Exam Guide.Covers all 8 CISSP domains:* Security and risk management* Asset security* Security engineering* Communication and network security* Identity and access management* Security assessment and testing* Security operations* Software development securityCD ICONElectronic content includes:* 1000+ multiple-choice practice exam questions* Hotspot and drag-and-drop practice exam questions* PDF copy of the complete book
Les mer
Complete, up-to-date coverage of the 2015 CISSP exam, including 1250+ realistic practice questions
Chapter 1: Security and Risk Management Chapter 2: Asset Security Chapter 3: Security Engineering Chapter 4: Communications and Network Security Chapter 5: Identity and Access Management Chapter 6: Security Assessment and Testing Chapter 7: Security Operations Chapter 8: Software Development Security Appendices Appendix A: About the New Question Format Appendix B: About the CD-ROM Appendix C: About the Download
Les mer

Produktdetaljer

ISBN
9781259585968
Publisert
2016-07-16
Utgave
4. utgave
Utgiver
Vendor
McGraw-Hill Education
Vekt
652 gr
Høyde
231 mm
Bredde
188 mm
Dybde
23 mm
Aldersnivå
06, P
Språk
Product language
Engelsk
Format
Product format
Kombinasjonsprodukt
Antall sider
420

Biographical note

Shon Harris is the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Forces Information Warfare unit, an instructor and an author. She has authored several international bestselling books on information security published by McGraw-Hill and Pearson which has sold over a million copies and have been translated into six languages. Ms. Harris authors academic textbooks, security articles for publication and is a technical editor for Information Security Magazine. Ms. Harris has consulted for a large number of organizations in every business sector (financial, medical, retail, entertainment, utility) and several U.S. government agencies over the last 18 years. Ms. Harris provides high-end, advanced and specialized consulting for organizations globally. She also works directly with law firms as a technical and expert witness on cases that range from patent infringement, criminal investigations, civil lawsuits and she specializes in cryptographic technologies. Ms. Harris has taught information security to a wide range of clients over the last 18 years, some of which have included; West Point, Microsoft, DHS, DoD, DoE, NSA, FBI, NASA, CDC, PWC, DISA, RSA, Visa, Intel, Cisco, Oracle, HP, Boeing, Northrop Grumman, Shell, Verizon, Citi, BoA, HSBC, Morgan Stanley, Symantec, Warner Brothers, Bridgestone, American Express, etc. Ms. Harris was recognized as one of the top 25 women in the Information Security field by Information Security Magazine. Jonathan Ham, CISSP, GSEC, GCIA, GCIH, is an independent consultant who specializes in large-scale enterprise security issues, from policy and procedure, through staffing and training, to scalable prevention, detection, and response technology and techniques. With a keen understanding of ROI and TCO, he has helped his clients achieve greater success for more than 12 years, advising in both the public and private sectors, from small upstarts to the Fortune 500. Jonathan has been commissioned to teach NCIS investigators how to use Snort, performed packet analysis from a facility more than 2000 feet underground, and chartered and trained the CIRT for one of the largest U.S. civilian federal agencies. He is a member of the GIAC Advisory Board and is a SANS instructor teaching their MGT414: SANS Training Program for CISSP Certification course. He is also co-author of Network Forensics: Tracking Hackers through Cyberspace, a textbook published by Prentice-Hall.