Official (ISC)2® Guide to the ISSAP® CBK Front Cover

Official (ISC)2® Guide to the ISSAP® CBK

  • Length: 521 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2010-10-25
  • ISBN-10: 1439800936
  • ISBN-13: 9781439800935
  • Sales Rank: #2368212 (See Top 100 Books)
Description

Candidates for the CISSP-ISSAP® professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP® CBK®, but also the ability to apply this in-depth knowledge to develop a detailed security architecture that meets all requirements.

Supplying an authoritative review of the key concepts and requirements of the ISSAP® CBK®, the Official (ISC) Guide to the ISSAP® CBK® provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Requirements Analysis, Access Control, Cryptography, Physical Security, BCP/DRP, and Telecommunications and Network Security.

  • Endorsed by the (ISC)
  • Follows the newly revised CISSP-ISSAP® CBK®
  • Reflects the evolving terminology and changing requirements for security professionals

With chapters written by those shaping this relatively new and rapidly developing field, this book is the only officially endorsed guide to the CISSP-ISSAP® CBK®. Read it, study it, and refer to it often as it will help improve your chances of achieving certification the first time around. Following certification it will serve as an authoritative reference for constructing architectures that are compliant with the latest security requirements.

Table of Contents

Chapter 1 Access Control Systems and Methodology
Chapter 2 Cryptography
Chapter 3 ISSAP® Physical Security Integration
Chapter 4 Requirements Analysis and Security Standards/Guidelines Criteria
Chapter 5 Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
Chapter 6 Telecommunications and Network Security

To access the link, solve the captcha.