View All Book Series

BOOK SERIES


(ISC)2 Press


13 Series Titles

Per Page
Sort

Display
Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Edition

Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Edition

Joseph Steinberg
May 14, 2015

The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the...

Official (ISC)2 Guide to the CISSP CBK, Fourth Edition

Official (ISC)2 Guide to the CISSP CBK, Fourth Edition

Adam Gordon
March 11, 2015

As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on a...

Official (ISC)2 Guide to the HCISPP CBK

Official (ISC)2 Guide to the HCISPP CBK

Steven Hernandez
September 10, 2014

HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one...

Official (ISC)2® Guide to the ISSAP® CBK, Second Edition

Official (ISC)2® Guide to the ISSAP® CBK, Second Edition

(ISC)² Corporate
August 29, 2013

Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.Supplying an authoritative review of...

Official (ISC)2 Guide to the CSSLP CBK, Second Edition

Official (ISC)2 Guide to the CSSLP CBK, Second Edition

Mano Paul
August 20, 2013

Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have...

Official (ISC)2® Guide to the CAP® CBK®, Second Edition

Official (ISC)2® Guide to the CAP® CBK®, Second Edition

Patrick D. Howard
July 18, 2012

Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP®) Common Body...

Official (ISC)2 Guide to the CISSP CBK, Second Edition

Official (ISC)2 Guide to the CISSP CBK, Second Edition

Steven Hernandez, CISSP
March 09, 2012

With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company’s reputation, violating a consumer’s privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for...

Official (ISC)2 Guide to the CSSLP

Official (ISC)2 Guide to the CSSLP

Mano Paul
June 13, 2011

As the global leader in information security education and certification, (ISC)2® has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP®) is a testament to the organization’s...

Official (ISC)2 Guide to the SSCP CBK, Second Edition

Official (ISC)2 Guide to the SSCP CBK, Second Edition

Harold F. Tipton
December 08, 2010

The (ISC)²® Systems Security Certified Practitioner (SSCP®) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the...

Information Security Management Handbook, Sixth Edition, Volume 3

Information Security Management Handbook, Sixth Edition, Volume 3

Harold F. Tipton, Micki Krause
June 24, 2009

Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals. In step with the lightning-quick, increasingly fast pace of change in the technology...

CISO Leadership: Essential Principles for Success

CISO Leadership: Essential Principles for Success

Todd Fitzgerald, Micki Krause
December 22, 2007

Caught in the crosshairs of “Leadership” and “Information Technology”, Information Security professionals are increasingly tapped to operate as business executives. This often puts them on a career path they did not expect, in a field not yet clearly defined. IT training does not usually...

Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®

Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®

Susan Hansche
September 29, 2005

The Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains:...

AJAX loader