Certification & Accreditation

PUBLISHED


Viewing: 1 - 10 of 14
Published:
September 10, 2014
Editor(s):
Steven Hernandez
HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one 
Published:
July 24, 2014
Editor(s):
Peter Stephenson
Cyber forensic knowledge requirements have expanded and evolved just as fast as the nature of digital information has—requiring cyber forensics professionals to understand far more than just hard drive intrusion analysis. The Certified Cyber Forensics Professional (CCFPSM) designation ensures that 
Published:
August 29, 2013
Editor(s):
(ISC)² Corporate
Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.Supplying an authoritative review of 
Published:
August 20, 2013
Author(s):
Mano Paul
The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable 
Published:
December 21, 2012
Editor(s):
Steven Hernandez, CISSP
Recognized as one of the best tools available for the information security professional and especially for candidates studying for the (ISC)2 CISSP examination, the Official (ISC)2® Guide to the CISSP® CBK®, Third Edition has been updated and revised to reflect the latest developments in this 
Published:
October 29, 2012
Author(s):
Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with 
Published:
December 13, 2011
Author(s):
James Schiel
Examining the questions most commonly asked by students attending Certified Scrum Master (CSM) and Certified Scrum Product Owner (CSPO) classes, The ScrumMaster Study Guide provides an accessible introduction to the concepts of Scrum and agile development. It compiles the insights gained by the 
Published:
April 11, 2011
Author(s):
(ISC)² Corporate, Harold F. Tipton
As the recognized leader in the field of information security education and certification, the (ISC)2® promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Security Management Professional ( 
Published:
December 08, 2010
Editor(s):
Harold F. Tipton
The (ISC)²® Systems Security Certified Practitioner (SSCP®) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the 
Published:
December 21, 2009
Editor(s):
Syed A. Ahson, Mohammad Ilyas
The Institute of Electrical and Electronics Engineers (IEEE) Communications Society designed the IEEE wireless communication engineering technologies (WCET) certification program to address the wireless industry’s growing need for communications professionals with practical problem-solving skills 

News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts and promotions!

Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Online Bestsellers:

_____

Is Your System Safe? Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Find Out What the Reviewers are Saying:

Slashdot

RSA Conference

_____

Find Our Books at the Bookstores of These Conferences:

RSA 2012: San Francisco, California, February 27-March 3

IBM Pulse 2012: Las Vegas, Nevada, March 4-7

T & F Journals
Did you know that you can access sample editions and free articles from the home pages of most Taylor & Francis Journals?

Information Technology for Development Published on behalf of the Commonwealth Secretariat

Information Security Journal: A Global Perspective The Official Journal of (ISC)2
Call for Papers!

Looking for a Complete Online Reference Library on Information Technology?

Our award-winning CRCnetBASE collections provide online access to full libraries of subject-specific handbooks and references:

Sign up for our industry eNewsletters! Simply click on the link below. You will be taken to a website. Sign up will be on the upper right hand side of the homepage.

IT Today

Information Security Today

IT Performance Improvement

Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press Pinterest Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us