skip to content
CISSP (ISC)2 Certified Information Systems Security Professional official study guide Preview this item
ClosePreview this item
Checking...

CISSP (ISC)2 Certified Information Systems Security Professional official study guide

Author: James Michael Stewart; Mike Chapple; Darril Gibson
Publisher: Indianapolis, Indiana : Sybex, a Wiley brand, [2015]
Edition/Format:   eBook : Document : English : Seventh editionView all editions and formats
Summary:
CISSP Study Guide -? fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Study guides
Additional Physical Format: Print version:
(OCoLC)894935239
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: James Michael Stewart; Mike Chapple; Darril Gibson
ISBN: 9781119042723 1119042720 9781119042754 1119042755
OCLC Number: 921176175
Notes: Includes index.
Description: 1 online resource (1023 pages)
Contents: ""Title page""; ""Copyright""; ""Epigraph""; ""Acknowledgments""; ""About the Authors""; ""Introduction""; ""Assessment Test""; ""Chapter 1 Security Governance Through Principles and Policies""; ""Understand and Apply Concepts of Confidentiality, Integrity, and Availability""; ""Apply Security Governance Principles""; ""Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines""; ""Understand and Apply Threat Modeling""; ""Integrate Security Risk Considerations into Acquisition Strategy and Practice""; ""Summary""; ""Exam Essentials""; ""Written Lab"" ""Review Questions""""Chapter 2 Personnel Security and Risk Management Concepts""; ""Contribute to Personnel Security Policies""; ""Security Governance""; ""Understand and Apply Risk Management Concepts""; ""Establish and Manage Information Security Education, Training, and Awareness""; ""Manage the Security Function""; ""Summary""; ""Exam Essentials""; ""Written Lab""; ""Review Questions""; ""Chapter 3 Business Continuity Planning""; ""Planning for Business Continuity""; ""Project Scope and Planning""; ""Business Impact Assessment""; ""Continuity Planning""; ""BCP Documentation"" ""Summary""""Exam Essentials""; ""Written Lab""; ""Review Questions""; ""Chapter 4 Laws, Regulations, and Compliance""; ""Categories of Laws""; ""Laws""; ""Compliance""; ""Contracting and Procurement""; ""Summary""; ""Exam Essentials""; ""Written Lab""; ""Review Questions""; ""Chapter 5 Protecting Security of Assets""; ""Classifying and Labeling Assets""; ""Identifying Data Roles""; ""Protecting Privacy""; ""Summary""; ""Exam Essentials""; ""Written Lab""; ""Review Questions""; ""Chapter 6 Cryptography and Symmetric Key Algorithms""; ""Historical Milestones in Cryptography"" ""Cryptographic Basics""""Modern Cryptography""; ""Symmetric Cryptography""; ""Cryptographic Life Cycle""; ""Summary""; ""Exam Essentials""; ""Written Lab""; ""Review Questions""; ""Chapter 7 PKI and Cryptographic Applications""; ""Asymmetric Cryptography""; ""Hash Functions""; ""Digital Signatures""; ""Public Key Infrastructure""; ""Asymmetric Key Management""; ""Applied Cryptography""; ""Cryptographic Attacks""; ""Summary""; ""Exam Essentials""; ""Written Lab""; ""Review Questions""; ""Chapter 8 Principles of Security Models, Design, and Capabilities"" ""Implement and Manage Engineering Processes Using Secure Design Principles""""Understand the Fundamental Concepts of Security Models""; ""Select Controls and Countermeasures Based on Systems Security Evaluation Models""; ""Understand Security Capabilities of Information Systems""; ""Summary""; ""Exam Essentials""; ""Written Lab""; ""Review Questions""; ""Chapter 9 Security Vulnerabilities, Threats, and Countermeasures""; ""Assess and Mitigate Security Vulnerabilities""; ""Client-Based""; ""Server-Based""; ""Database Security""; ""Distributed Systems""; ""Industrial Control Systems""
Responsibility: James Michael Stewart, Mike Chapple, Darril Gibson.

Abstract:

CISSP Study Guide - fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/921176175> # CISSP (ISC)2 Certified Information Systems Security Professional official study guide
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "921176175" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/inu> ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/0128-1/{6DE63A7E-6DA6-4D32-B574-7AD77BC0DE14}Img100.jpg'" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/2848026966#Topic/computer_security_examinations> ; # Computer security--Examinations
    schema:about <http://experiment.worldcat.org/entity/work/data/2848026966#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/2848026966#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/2848026966#Topic/computer_networks_security_measures_examinations> ; # Computer networks--Security measures--Examinations
    schema:about <http://experiment.worldcat.org/entity/work/data/2848026966#Topic/electronic_data_processing_personnel_certification> ; # Electronic data processing personnel--Certification
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/2848026966#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/2848026966#Topic/telecommunications_engineers_certification> ; # Telecommunications engineers--Certification
    schema:author <http://experiment.worldcat.org/entity/work/data/2848026966#Person/stewart_james_michael> ; # James Michael Stewart
    schema:author <http://experiment.worldcat.org/entity/work/data/2848026966#Person/gibson_darril> ; # Darril Gibson
    schema:author <http://experiment.worldcat.org/entity/work/data/2848026966#Person/chapple_mike> ; # Mike Chapple
    schema:bookEdition "Seventh edition." ;
    schema:bookFormat schema:EBook ;
    schema:datePublished "2015" ;
    schema:description "CISSP Study Guide -? fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 1,000 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software?Development Security."@en ;
    schema:description """Title page""; ""Copyright""; ""Epigraph""; ""Acknowledgments""; ""About the Authors""; ""Introduction""; ""Assessment Test""; ""Chapter 1 Security Governance Through Principles and Policies""; ""Understand and Apply Concepts of Confidentiality, Integrity, and Availability""; ""Apply Security Governance Principles""; ""Develop and Implement Documented Security Policy, Standards, Procedures, and Guidelines""; ""Understand and Apply Threat Modeling""; ""Integrate Security Risk Considerations into Acquisition Strategy and Practice""; ""Summary""; ""Exam Essentials""; ""Written Lab"""@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/2848026966> ;
    schema:genre "Electronic books"@en ;
    schema:genre "Study guides"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/894935239> ;
    schema:name "CISSP (ISC)2 Certified Information Systems Security Professional official study guide"@en ;
    schema:productID "921176175" ;
    schema:url <http://link.overdrive.com/?websiteID=546&titleID=2386190> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=4040731> ;
    schema:url <http://ebooks.kcls.org/ContentDetails.htm?ID=6DE63A7E-6DA6-4D32-B574-7AD77BC0DE14> ;
    schema:url <http://samples.overdrive.com/?crid=6de63a7e-6da6-4d32-b574-7ad77bc0de14&.epub-sample.overdrive.com> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1064272> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=4040731> ;
    schema:url <https://www.overdrive.com/search?q=6DE63A7E-6DA6-4D32-B574-7AD77BC0DE14> ;
    schema:url <http://link.overdrive.com/?websiteID=310&titleID=2386190> ;
    schema:url <http://www.myilibrary.com?id=831245> ;
    schema:url <http://lib.myilibrary.com/browse/open.asp?id=831245&entityid=https://idp.warwick.ac.uk/idp/shibboleth> ;
    schema:url <http://api.overdrive.com/v1/collections/v1L1BegEAAA2m/products/6de63a7e-6da6-4d32-b574-7ad77bc0de14> ;
    schema:url <http://gold.worcester.edu/login?url=http://ebookcentral.proquest.com/lib/masslibsystem/detail.action?docID=4040731> ;
    schema:url "http://images.contentreserve.com/ImageType-100/0128-1/{6DE63A7E-6DA6-4D32-B574-7AD77BC0DE14}Img100.jpg" ;
    schema:workExample <http://worldcat.org/isbn/9781119042723> ;
    schema:workExample <http://worldcat.org/isbn/9781119042754> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/921176175> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/2848026966#Person/chapple_mike> # Mike Chapple
    a schema:Person ;
    schema:familyName "Chapple" ;
    schema:givenName "Mike" ;
    schema:name "Mike Chapple" ;
    .

<http://experiment.worldcat.org/entity/work/data/2848026966#Person/gibson_darril> # Darril Gibson
    a schema:Person ;
    schema:familyName "Gibson" ;
    schema:givenName "Darril" ;
    schema:name "Darril Gibson" ;
    .

<http://experiment.worldcat.org/entity/work/data/2848026966#Person/stewart_james_michael> # James Michael Stewart
    a schema:Person ;
    schema:familyName "Stewart" ;
    schema:givenName "James Michael" ;
    schema:name "James Michael Stewart" ;
    .

<http://experiment.worldcat.org/entity/work/data/2848026966#Topic/computer_networks_security_measures_examinations> # Computer networks--Security measures--Examinations
    a schema:Intangible ;
    schema:name "Computer networks--Security measures--Examinations"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2848026966#Topic/computer_security_examinations> # Computer security--Examinations
    a schema:Intangible ;
    schema:name "Computer security--Examinations"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2848026966#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2848026966#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2848026966#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2848026966#Topic/electronic_data_processing_personnel_certification> # Electronic data processing personnel--Certification
    a schema:Intangible ;
    schema:name "Electronic data processing personnel--Certification"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2848026966#Topic/telecommunications_engineers_certification> # Telecommunications engineers--Certification
    a schema:Intangible ;
    schema:name "Telecommunications engineers--Certification"@en ;
    .

<http://worldcat.org/isbn/9781119042723>
    a schema:ProductModel ;
    schema:isbn "1119042720" ;
    schema:isbn "9781119042723" ;
    .

<http://worldcat.org/isbn/9781119042754>
    a schema:ProductModel ;
    schema:isbn "1119042755" ;
    schema:isbn "9781119042754" ;
    .

<http://www.worldcat.org/oclc/894935239>
    a schema:CreativeWork ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/921176175> ; # CISSP (ISC)2 Certified Information Systems Security Professional official study guide
    .

<http://www.worldcat.org/title/-/oclc/921176175>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/921176175> ; # CISSP (ISC)2 Certified Information Systems Security Professional official study guide
    schema:dateModified "2018-09-17" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.