The Cissp Prep Guide : Gold Edition (HAR/CDR)

個数:

The Cissp Prep Guide : Gold Edition (HAR/CDR)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 928 p.
  • 言語 ENG
  • 商品コード 9780471268024
  • DDC分類 005.8

Full Description


The Gold Edition has been updated to include CISSP bonus questions never before published and advanced question and answer tutorial. The CD-ROM contains 660 questions of which 360 have never before been available electronically. All questions have been designed with Boson, the premier interactive test engine for technical books in the industry. Authors are experts in the security certification field and have particular expertise in the CISSP Exam.

Contents

Acknowledgments.Foreword.Introduction.About the Authors.Chapter 1. Security Management Practices.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 2. Access Control Systems.Rationale.Controls.Identification and Authentication.Some Access Control Issues.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 3. Telecommunications and Network Security.Our Goals.Domain Definition.Management Concepts.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 4. Cryptography.Introduction.Cryptographic Technologies.Secret Key Cryptography (Symmetric Key).Public (Asymmetric) Key Cryptosystems.Approaches to Escrowed Encryption.Internet Security Applications.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 5. Security Architecture and Models.Security Architecture.Assurance.Information Security Models.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 6. Operations Security.Our Goals.Domain Definition.Controls and Protections.Monitoring and Auditing.Threats and Vulnerabilities.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 7. Applications and Systems Development.The Software Life Cycle.Development Process.The Software Capability Maturity Model (CMM).Object-Oriented Systems.Artificial Intelligence Systems.Database Systems.Application Controls.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 8. Business Continuity Planning and Disaster Recovery Planning.Our Goals.Domain Definition.Business Continuity Planning.Disaster Recovery Planning.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 9. Law, Investigation, and Ethics.Types of Computer Crime.Law.Investigation.Liability.Ethics.Sample Questions.Bonus Questions.Advanced Sample Questions.Chapter 10. Physical Security.Our Goals.Domain Definition.Threats to Physical Security.Controls for Physical Security.Sample Questions.Bonus Questions.Advanced Sample Questions.Appendix A: A Process Approach to HIPAA Compliance through a HIPAA-CMM.Background.HIPAA Security Requirements Mappings to PAs.HPAs.Defining and Using the HIPAA-CMM.Conclusion.References.Appendix A: HIPAA-CMM PA Overview.Appendix B: Glossary (SSE-CMM v2.0).Appendix C: The Ideal Approach to Process Improvement.Appendix D: SSE-CMM MAPPINGS and General Considerations.Appendix B: The NSA InfoSec Assessment Methodology.History of the NIPC.About the ISSO.The InfoSec Assessment Methodology.PDD#63.Appendix C: The Case for Ethical Hacking.Rationale.Roles and Responsibilities.Implementation.Summary.Appendix D: The Common Criteria.Common Criteria: Launching the International Standard.Glossary.For More Information.Appendix E: BS7799.Appendix F: HIPAA Updates.Scope.Title II Administrative Simplification.Conclusion.Appendix G: References for Further Study.Web Sites.Appendix H: Answers to Sample and Bonus Questions.Chapter 1A--Security Management Practices.Chapter 2A--Access Control Systems and Methodology.Chapter 3A--Telecommunications and Network Security.Chapter 4A--Cryptography.Chapter 5A--Security Architecture and Models.Chapter 6A--Operations Security.Chapter 7A--Applications and Systems Development.Chapter 8A--Business Continuity PlanningA--Disaster Recovery Planning.Chapter 9A--Law, Investigation, and Ethics.Chapter 10A--Physical Security.Appendix I: Answers to Advanced Sample Questions.Chapter 1A--Security Management Practices.Chapter 2A--Access Control Systems and Methodology.Chapter 3A--Telecommunications and Network Security.Chapter 4A--Cryptography.Chapter 5A--Security Architecture and Models.Chapter 6A--Operations Security.Chapter 7A--Applications and Systems Development.Chapter 8A--Business Continuity PlanningA--Disaster Recovery Planning.Chapter 9A--Law, Investigation, and Ethics.Chapter 10A--Physical Security.Notes.Appendix J: What's on the CD-ROM.Glossary of Terms and Acronyms.Index.