Certification & Accreditation

14 Results


Subject


Status


Type

Certification & Accreditation

Per Page:
Sort:
PCI Compliance: The Definitive Guide

PCI Compliance: The Definitive Guide

Featured

Abhay Bhargav

May 5, 2014

Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide explai...

The Influential Project Manager: Winning Over Team Members and Stakeholders

The Influential Project Manager: Winning Over Team Members and Stakeholders

Featured

Alfonso Bucero,MSc,PMP, PMI-RMP, PMI F

July 25, 2014

If you want to be a successful project manager, you need to become a person of influence. Without influence, there can be no success as a project manager. And, although all key success criteria point to the importance of developing soft skills as a project manager, few books exist about how to devel...

Project Leadership: Creating Value with an Adaptive Project Organization

Project Leadership: Creating Value with an Adaptive Project Organization

Featured

Barry L. Cross, M. Kathryn Brohman

July 1, 2014

Look around your organization: can you identify who owns project management? Would that person appreciate that they own responsibility for your projects? Project Leadership: Creating Value with an Adaptive Project Organization highlights the importance of these questions—underlining the importance...

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Featured

Rafay Baloch

July 28, 2014

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking t...

Official (ISC)2 Guide to the HCISPP CBK

Official (ISC)2 Guide to the HCISPP CBK

Steven Hernandez

September 10, 2014

HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one...

Official (ISC)2® Guide to the CCFP CBK

Official (ISC)2® Guide to the CCFP CBK

Peter Stephenson

July 24, 2014

Cyber forensic knowledge requirements have expanded and evolved just as fast as the nature of digital information has—requiring cyber forensics professionals to understand far more than just hard drive intrusion analysis. The Certified Cyber Forensics Professional (CCFPSM) designation ensures that...

Official (ISC)2® Guide to the ISSAP® CBK, Second Edition

Official (ISC)2® Guide to the ISSAP® CBK, Second Edition

(ISC)² Corporate

August 29, 2013

Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.Supplying an authoritative review of...

Official (ISC)2 Guide to the CSSLP CBK, Second Edition

Official (ISC)2 Guide to the CSSLP CBK, Second Edition

Mano Paul

August 20, 2013

The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable...

Official (ISC)2 Guide to the CISSP CBK, Third Edition

Official (ISC)2 Guide to the CISSP CBK, Third Edition

Steven Hernandez, CISSP

December 21, 2012

Recognized as one of the best tools available for the information security professional and especially for candidates studying for the (ISC)2 CISSP examination, the Official (ISC)2® Guide to the CISSP® CBK®, Third Edition has been updated and revised to reflect the latest developments in this...

Network Attacks and Defenses: A Hands-on Approach

Network Attacks and Defenses: A Hands-on Approach

Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, Sujith Samuel Mathew

October 29, 2012

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with...

The ScrumMaster Study Guide

The ScrumMaster Study Guide

James Schiel

December 13, 2011

Examining the questions most commonly asked by students attending Certified Scrum Master (CSM) and Certified Scrum Product Owner (CSPO) classes, The ScrumMaster Study Guide provides an accessible introduction to the concepts of Scrum and agile development. It compiles the insights gained by the...

Official (ISC)2® Guide to the ISSMP® CBK®

Official (ISC)2® Guide to the ISSMP® CBK®

(ISC)² Corporate, Harold F. Tipton

April 11, 2011

As the recognized leader in the field of information security education and certification, the (ISC)2® promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Security Management Professional (...

Official (ISC)2 Guide to the SSCP CBK, Second Edition

Official (ISC)2 Guide to the SSCP CBK, Second Edition

Harold F. Tipton

December 08, 2010

The (ISC)²® Systems Security Certified Practitioner (SSCP®) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the...

Get Certified: A Guide to Wireless Communication Engineering Technologies

Get Certified: A Guide to Wireless Communication Engineering Technologies

Syed A. Ahson, Mohammad Ilyas

December 21, 2009

The Institute of Electrical and Electronics Engineers (IEEE) Communications Society designed the IEEE wireless communication engineering technologies (WCET) certification program to address the wireless industry’s growing need for communications professionals with practical problem-solving skills...

CISO Leadership: Essential Principles for Success

CISO Leadership: Essential Principles for Success

Todd Fitzgerald, Micki Krause

December 22, 2007

Caught in the crosshairs of “Leadership” and “Information Technology”, Information Security professionals are increasingly tapped to operate as business executives. This often puts them on a career path they did not expect, in a field not yet clearly defined. IT training does not usually...

Complete Guide to CISM Certification

Complete Guide to CISM Certification

Thomas R. Peltier, Justin Peltier

December 13, 2006

The Certified Information Security Manager®(CISM®) certification program was developed by the Information Systems Audit and Controls Association (ISACA®). It has been designed specifically for experienced information security managers and those who have information security management...