Official (ISC)2® Guide to the ISSAP® CBK

(ISC)² Corporate

October 25, 2010 by Auerbach Publications
Reference - 522 Pages - 125 B/W Illustrations
ISBN 9781439800935 - CAT# K10073
Series: (ISC)2 Press

This product is not available
FREE Standard Shipping!

Features

  • Supplies the understanding required to implement the latest security protocols for improved productivity, profitability, security, and efficiency
  • Provides an authoritative review of the key concepts and requirements of the ISSAP® CBK®
  • Encompasses all the knowledge elements needed to create secure architectures
  • Reflects the evolving terminology and changing requirements for security professionals
  • Covers each of the six domains contained in the newly revised CISSP-ISSAP® CBK®

Summary

Candidates for the CISSP-ISSAP® professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP® CBK®, but also the ability to apply this in-depth knowledge to develop a detailed security architecture that meets all requirements.

Supplying an authoritative review of the key concepts and requirements of the ISSAP® CBK®, the Official (ISC) Guide to the ISSAP® CBK® provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Requirements Analysis, Access Control, Cryptography, Physical Security, BCP/DRP, and Telecommunications and Network Security.

  • Endorsed by the (ISC)
  • Follows the newly revised CISSP-ISSAP® CBK®
  • Reflects the evolving terminology and changing requirements for security professionals

With chapters written by those shaping this relatively new and rapidly developing field, this book is the only officially endorsed guide to the CISSP-ISSAP® CBK®. Read it, study it, and refer to it often as it will help improve your chances of achieving certification the first time around. Following certification it will serve as an authoritative reference for constructing architectures that are compliant with the latest security requirements.