Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20
-
Inloggen
-- Inloggen
  • accountoverzicht
  • bestellingen
  • facturen betalen
  • downloadcentrum
  • summaries
  • gegevens
  • nieuwsbrief
  • partnerprogramma
  • financieel
  • inloggen
  • uitloggen

Uw winkelwagen

Naar winkelwagen Verder winkelen
Managementboeken
Alle managementboeken
  • Advisering
  • Algemeen management
  • Coaching en trainen
  • Communicatie en media
  • Economie
  • Financieel management
  • Inkoop en logistiek
  • Internet en social media
  • IT-management / ICT
  • Juridisch
  • Leiderschap
  • Marketing
  • Mens en maatschappij
  • Non-profit
  • Ondernemen
  • Organisatiekunde
  • Personal finance
  • Personeelsmanagement
  • Persoonlijke effectiviteit
  • Projectmanagement
  • Psychologie
  • Reclame en verkoop
  • Strategisch management
  • Verandermanagement
  • Werk en loopbaan
Overige boeken
Alle overige boeken
  • Cadeauboeken
  • Computer en informatica
  • Economie
  • Filosofie
  • Flora en fauna
  • Geneeskunde
  • Geschiedenis
  • Gezondheid
  • Informatief / professioneel
  • Jeugd
  • Juridisch
  • Koken en eten
  • Kunst en cultuur
  • Literatuur en romans
  • Mens en maatschappij
  • Naslagwerken
  • Paramedisch
  • Psychologie
  • Reizen
  • Religie
  • Schoolboeken
  • Spiritualiteit
  • Sport, hobby, lifestyle
  • Thrillers en spanning
  • Wetenschap en techniek
  • Woordenboeken en taal
Seminars + Trainingen
  • Live events
  • Online training
  • Alle programma's
Attenderingen
  • Algemeen
    • Recht op u af
    • Juridische attendering
    • Hiatensignalering juridisch
    • Seriesignalering
    • Herdruksignalering
    • Internationaal
  • Aanbevolen per ministerie
    • Algemene Zaken
    • Binnenlandse Zaken en Koninkrijksrelaties
    • Buitenlandse Zaken
    • Defensie
    • Economische Zaken en Klimaat
    • Financiën
    • Infrastructuur en Waterstaat
    • Justitie en Veiligheid
    • Landbouw, Natuur en Voedselkwaliteit
    • Onderwijs, Cultuur en Wetenschap
    • Nationale Politie
    • Sociale Zaken en Werkgelegenheid
    • Volksgezondheid, Welzijn en Sport
Periodieken
Alle periodieken
  • Algemeen
    • Uw periodieken
    • Lopende abonnementen
    • Verlengen / opzeggen
    • Openstaande claims
    • Bibliografische wijzigingen
    • Abonnementshouders
    • Afleveradressen
    • Referenties
    • Notities
  • Aanbevolen per ministerie
    • Algemene Zaken
    • Binnenlandse Zaken en Koninkrijksrelaties
    • Buitenlandse Zaken
    • Defensie
    • Economische Zaken en Klimaat
    • Financiën
    • Infrastructuur en Waterstaat
    • Justitie en Veiligheid
    • Landbouw, Natuur en Voedselkwaliteit
    • Onderwijs, Cultuur en Wetenschap
    • Nationale Politie
    • Sociale Zaken en Werkgelegenheid
    • Volksgezondheid, Welzijn en Sport
Boekseries
Alle boekseries
  • Algemeen
    • Uw serieabonnementen
    • Geadresseerden
    • Abonnementshouders
    • Afleveradressen
    • Referenties
    • Notities
  • Aanbevolen per ministerie
    • Algemene Zaken
    • Binnenlandse Zaken en Koninkrijksrelaties
    • Buitenlandse Zaken
    • Defensie
    • Economische Zaken en Klimaat
    • Financiën
    • Infrastructuur en Waterstaat
    • Justitie en Veiligheid
    • Landbouw, Natuur en Voedselkwaliteit
    • Onderwijs, Cultuur en Wetenschap
    • Nationale Politie
    • Sociale Zaken en Werkgelegenheid
    • Volksgezondheid, Welzijn en Sport
Online magazine
  • Online Magazine
010-4731397
Klantenservice
Mijn account
Mijn bestellingen
010-4731397
Boeken IT-management / ICT (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple

Mike Chapple, PhD, CISSP, is Teaching Professor of IT, Analytics, and Operations at the University of Notre Dame’s Mendoza College of Business.

Meer over de auteurs
Mike Chapple, James Stewart, Darril Gibson

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

Certified Information Systems Security Professional Official Study Guide

Paperback Engels 2018 9781119475934
Niet leverbaar.
77,30
Samenvatting Specificaties Over de auteur Inhoudsopgave

Samenvatting

CISSP Study Guide - fully updated for the 2018 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more.

Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Six unique 150 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam.

More than 700 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the examA searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk ManagementAsset SecuritySecurity EngineeringCommunication and Network SecurityIdentity and Access ManagementSecurity Assessment and TestingSecurity OperationsSoftware Development Security

Specificaties

ISBN13:9781119475934
Trefwoorden:netwerken, netwerkbeheer, Cisco, Certificering CISSP
Taal:Engels
Bindwijze:paperback
Aantal pagina's:1104
Uitgever:Sybex
Druk:8
Verschijningsdatum:25-7-2018
Hoofdrubriek:IT-management / ICT
ISSN:

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!
Schrijf een recensie

Geef uw waardering

Zeer goed Goed Voldoende Matig Slecht

Over Mike Chapple

Mike Chapple, PhD, CISSP, is Teaching Professor of IT, Analytics, and Operations at the University of Notre Dame’s Mendoza College of Business. He is a cybersecurity professional and educator with over 25 years of experience. Mike provides cybersecurity certification resources at his website, CertMike.com

Andere boeken door Mike Chapple

Bekijk alle boeken

Over Darril Gibson

Darril Gibson, CISSP, Security+, CASP, is the CEO of YCDA (short for You Can Do Anything), and he has authored or coauthored more than 40 books. Darril regularly writes, consults, and teaches on a wide variety of technical and security topics and holds several certifications.

Andere boeken door Darril Gibson

Bekijk alle boeken

Inhoudsopgave

Introduction xxxiii
Assessment Test xlii
Chapter 1 Security Governance Through Principles and Policies 1
Understand and Apply Concepts of Confidentiality, Integrity, and Availability 2
Evaluate and Apply Security Governance Principles 14
Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines 26
Understand and Apply Threat Modeling Concepts and Methodologies 30
Apply Risk-Based Management Concepts to the Supply Chain 38
Summary 40
Exam Essentials 42
Written Lab 44
Review Questions 45
Chapter 2 Personnel Security and Risk Management Concepts 49
Personnel Security Policies and Procedures 51
Security Governance 62
Understand and Apply Risk Management Concepts 63
Establish and Maintain a Security Awareness, Education, and Training Program 86
Manage the Security Function 87
Summary 88
Exam Essentials 89
Written Lab 92
Review Questions 93
Chapter 3 Business Continuity Planning 97
Planning for Business Continuity 98
Project Scope and Planning 99
Business Impact Assessment 105
Continuity Planning 111
Plan Approval and Implementation 114
Summary 119
Exam Essentials 119
Written Lab 120
Review Questions 121
Chapter 4 Laws, Regulations, and Compliance 125
Categories of Laws 126
Laws 129
Compliance 149
Contracting and Procurement 150
Summary 151
Exam Essentials 152
Written Lab 153
Review Questions 154
Chapter 5 Protecting Security of Assets 159
Identify and Classify Assets 160
Determining Ownership 178
Using Security Baselines 186
Summary 187
Exam Essentials 188
Written Lab 189
Review Questions 190
Chapter 6 Cryptography and Symmetric Key Algorithms 195
Historical Milestones in Cryptography 196
Cryptographic Basics 198
Modern Cryptography 214
Symmetric Cryptography 219
Cryptographic Lifecycle 228
Summary 229
Exam Essentials 229
Written Lab 231
Review Questions 232
Chapter 7 PKI and Cryptographic Applications 237
Asymmetric Cryptography 238
Hash Functions 242
Digital Signatures 246
Public Key Infrastructure 249
Asymmetric Key Management 253
Applied Cryptography 254
Cryptographic Attacks 265
Summary 268
Exam Essentials 269
Written Lab 270
Review Questions 271
Chapter 8 Principles of Security Models, Design, and Capabilities 275
Implement and Manage Engineering Processes Using Secure Design Principles 276
Understand the Fundamental Concepts of Security Models 281
Select Controls Based On Systems Security Requirements 295
Understand Security Capabilities of Information Systems 309
Summary 311
Exam Essentials 312
Written Lab 313
Review Questions 314
Chapter 9 Security Vulnerabilities, Threats, and Countermeasures 319
Assess and Mitigate Security Vulnerabilities 320
Client-Based Systems 342
Server-Based Systems 346
Database Systems Security 347
Distributed Systems and Endpoint Security 350
Internet of Things 358
Industrial Control Systems 359
Assess and Mitigate Vulnerabilities in Web-Based Systems 360
Assess and Mitigate Vulnerabilities in Mobile Systems 365
Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems 375
Essential Security Protection Mechanisms 379
Common Architecture Flaws and Security Issues 384
Summary 390
Exam Essentials 391
Written Lab 394
Review Questions 395
Chapter 10 Physical Security Requirements 399
Apply Security Principles to Site and Facility Design 400
Implement Site and Facility Security Controls 403
Implement and Manage Physical Security 422
Summary 431
Exam Essentials 432
Written Lab 434
Review Questions 435
Chapter 11 Secure Network Architecture and Securing Network Components 439
OSI Model 440
TCP/IP Model 451
Converged Protocols 470
Wireless Networks 472
Secure Network Components 486
Cabling, Wireless, Topology, Communications, and Transmission Media Technology 495
Summary 513
Exam Essentials 514
Written Lab 516
Review Questions 517
Chapter 12 Secure Communications and Network Attacks 521
Network and Protocol Security Mechanisms 522
Secure Voice Communications 525
Multimedia Collaboration 529
Manage Email Security 530
Remote Access Security Management 536
Virtual Private Network 540
Virtualization 546
Network Address Translation 549
Switching Technologies 553
WAN Technologies 556
Miscellaneous Security Control Characteristics 561
Security Boundaries 563
Prevent or Mitigate Network Attacks 564
Summary 569
Exam Essentials 571
Written Lab 573
Review Questions 574
Chapter 13 Managing Identity and Authentication 579
Controlling Access to Assets 580
Comparing Identification and Authentication 584
Implementing Identity Management 602
Managing the Identity and Access Provisioning Lifecycle 611
Summary 614
Exam Essentials 615
Written Lab 617
Review Questions 618
Chapter 14 Controlling and Monitoring Access 623
Comparing Access Control Models 624
Understanding Access Control Attacks 635
Summary 653
Exam Essentials 654
Written Lab 656
Review Questions 657
Chapter 15 Security Assessment and Testing 661
Building a Security Assessment and Testing Program 662
Performing Vulnerability Assessments 668
Testing Your Software 681
Implementing Security Management Processes 688
Summary 690
Exam Essentials 691
Written Lab 692
Review Questions 693
Chapter 16 Managing Security Operations 697
Applying Security Operations Concepts 698
Securely Provisioning Resources 710
Managing Configuration 718
Managing Change 719
Managing Patches and Reducing Vulnerabilities 723
Summary 728
Exam Essentials 729
Written Lab 731
Review Questions 732
Chapter 17 Preventing and Responding to Incidents 737
Managing Incident Response 738
Implementing Detective and Preventive Measures 745
Logging, Monitoring, and Auditing 773
Summary 790
Exam Essentials 792
Written Lab 795
Review Questions 796
Chapter 18 Disaster Recovery Planning 801
The Nature of Disaster 802
Understand System Resilience and Fault Tolerance 812
Recovery Strategy 818
Recovery Plan Development 827
Training, Awareness, and Documentation 835
Testing and Maintenance 836
Summary 838
Exam Essentials 838
Written Lab 839
Review Questions 840
Chapter 19 Investigations and Ethics 845
Investigations 846
Major Categories of Computer Crime 857
Ethics 861
Summary 864
Exam Essentials 864
Written Lab 865
Review Questions 866
Chapter 20 Software Development Security 871
Introducing Systems Development Controls 872
Establishing Databases and Data Warehousing 895
Storing Data and Information 904
Understanding Knowledge-Based Systems 906
Summary 909
Exam Essentials 909
Written Lab 910
Review Questions 911
Chapter 21 Malicious Code and Application Attacks 915
Malicious Code 916
Password Attacks 929
Application Attacks 933
Web Application Security 935
Reconnaissance Attacks 940
Masquerading Attacks 941
Summary 942
Exam Essentials 943
Written Lab 944
Review Questions 945

Appendix A Answers to Review Questions 949
Chapter 1: Security Governance Through Principles and Policies 950
Chapter 2: Personnel Security and Risk Management Concepts 951
Chapter 3: Business Continuity Planning 952
Chapter 4: Laws, Regulations, and Compliance 954
Chapter 5: Protecting Security of Assets 956
Chapter 6: Cryptography and Symmetric Key Algorithms 958
Chapter 7: PKI and Cryptographic Applications 960
Chapter 8: Principles of Security Models, Design, and Capabilities 961
Chapter 9: Security Vulnerabilities, Threats, and Countermeasures 963
Chapter 10: Physical Security Requirements 965
Chapter 11: Secure Network Architecture and Securing Network Components 966
Chapter 12: Secure Communications and Network Attacks 968
Chapter 13: Managing Identity and Authentication 969
Chapter 14: Controlling and Monitoring Access 971
Chapter 15: Security Assessment and Testing 973
Chapter 16: Managing Security Operations 975
Chapter 17: Preventing and Responding to Incidents 977
Chapter 18: Disaster Recovery Planning 980
Chapter 19: Investigations and Ethics 981
Chapter 20: Software Development Security 983
Chapter 21: Malicious Code and Application Attacks 984

Appendix B Answers to Written Labs 987
Chapter 1: Security Governance Through Principles and Policies 988
Chapter 2: Personnel Security and Risk Management Concepts 988
Chapter 3: Business Continuity Planning 989
Chapter 4: Laws, Regulations, and Compliance 990
Chapter 5: Protecting Security of Assets 991
Chapter 6: Cryptography and Symmetric Key Algorithms 991
Chapter 7: PKI and Cryptographic Applications 992
Chapter 8: Principles of Security Models, Design, and Capabilities 992
Chapter 9: Security Vulnerabilities, Threats, and Countermeasures 993
Chapter 10: Physical Security Requirements 994
Chapter 11: Secure Network Architecture and Securing Network Components 994
Chapter 12: Secure Communications and Network Attacks 995
Chapter 13: Managing Identity and Authentication 996
Chapter 14: Controlling and Monitoring Access 996
Chapter 15: Security Assessment and Testing 997
Chapter 16: Managing Security Operations 997
Chapter 17: Preventing and Responding to Incidents 998
Chapter 18: Disaster Recovery Planning 999
Chapter 19: Investigations and Ethics 999
Chapter 20: Software Development Security 1000
Chapter 21: Malicious Code and Application Attacks 1000

Index 1001

Aanbevolen live events...

donderdag 25-05-2023

Regels en de ruimte

Seminar

Mensen die dit boek kochten, kochten ook...

  • The Official (ISC)2 Guide to the CISSP CBK Reference
    John Warsinske
    The Official (ISC)2 Guide to the CISSP CBK Reference
    € 98,11
  • Agile Retrospectives
    Esther Derby
    Agile Retrospectives
    € 33,73
  • CompTIA Security+ Study Guide
    Mike Chapple
    CompTIA Security+ Study Guide
    € 52,84
  • (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
    Mike Chapple
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
    € 76,05
  • (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
    Mike Chapple
    (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
    € 43,29
  • (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
    Mike Chapple
    (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
    € 103,34

Managementboek Top 100

Bekijk de volledige Managementboek Top 100

Rubrieken

  • Advisering
  • Algemeen management
  • Coaching en trainen
  • Communicatie en media
  • Economie
  • Financieel management
  • Inkoop en logistiek
  • Internet en social media
  • IT-management / ICT
  • Juridisch
  • Leiderschap
  • Marketing
  • Mens en maatschappij
  • Non-profit
  • Ondernemen
  • Organisatiekunde
  • Personal finance
  • Personeelsmanagement
  • Persoonlijke effectiviteit
  • Projectmanagement
  • Psychologie
  • Reclame en verkoop
  • Strategisch management
  • Verandermanagement
  • Werk en loopbaan
Uw cookie-instellingen
Deze website maakt gebruik van verschillende soorten cookies. Sommige cookies worden geplaatst door diensten van derden die op onze pagina's worden weergegeven. Om deze externe content te kunnen tonen is nodig dat u toestemming geeft voor het zetten van persoonlijke en marketingcookies. U kunt uw toestemming op elk moment wijzigen of intrekken. In onze cookieverklaring vindt u meer informatie.

Functionele cookies
Deze zijn noodzakelijk voor de werking van de website, zonder deze cookies kan de website niet naar behoren werken.

Persoonlijke en marketingcookies
Wij gebruiken cookies voor statistieken om bij te houden en rapportages te krijgen over hoe bezoekers de website gebruiken. Zo kunnen wij onze website verbeteren. Marketingcookies worden gebruikt om bezoekers te volgen wanneer ze verschillende websites bezoeken. Hun doel is advertenties weergeven die zijn toegesneden op en relevant zijn voor de individuele gebruiker.
Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

Klantenservice

Contact Voorwaarden Bestellen en retourneren Lezen en luisteren Voor auteurs Partnerprogramma

Zakelijk

Zakelijke diensten Partnerprogramma Cadeaubonnen

Altijd op de hoogte

Schrijf u in voor onze nieuwsbrief en blijf up-to-date met relevante interviews en recensies, inspirerende events en de beste acties.
Meer dan alleen managementboeken
Thuiswinkel waarborg Algemene voorwaarden Privacy Cookies Service & Contact
© 2023 Mainpress BV

Populaire producten

    Personen

      Trefwoorden

        (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

        (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
        Mike Chapple , James Stewart , Darril Gibson
        /