CISSP For Dummies by Lawrence C. Miller, Peter H. Gregory

By Lawrence C. Miller, Peter H. Gregory

A absolutely up-to-date consultant to CISSP certification

CISSP certification is the main prestigious and hugely valued of the safety certifications. this can be the e-book you must technique the examination with self assurance and develop into CISSP qualified! The CISSP physique of information underwent many alterations in 2012, and this publication covers all of them. With a down-to-earth strategy, it offers the entire details lined within the examination plus various self-assessment instruments, quickly overview and Prep checks to offer you perform, a pattern examination, and 1000's of randomly generated evaluate questions about the Dummies attempt Engine, on hand at the better half website.

  • The coveted CISSP certification is the main prestigious of the protection certifications; this well known advisor covers all of the most modern updates to organize you for the examination
  • Includes quite a few self-assessment instruments that can assist you gauge your development, together with quickly overview exams first and foremost of each bankruptcy, a Prep attempt on the finish of each bankruptcy, a pattern examination, and countless numbers of randomly generated attempt questions
  • Features the preferred Dummies try out Engine at the significant other web site
  • Offers test-taking counsel and lots of assets for additional study

CISSP For Dummies, 4th Edition offers the instruments to take the CISSP examination with self assurance and earn your certification!

Show description

Read or Download CISSP For Dummies PDF

Best security & encryption books

Error control coding: from theory to practice

This creation to uncomplicated coding ideas makes use of examples to give an explanation for primary recommendations and their purposes. complicated arithmetic are stored to a minimal. Drawing from electronic communications and knowledge concept, the e-book emphasizes the choice of applicable codes and the layout of decoders. Chapters hide convolution codes, linear block codes, cyclic codes, finite box mathematics, BCH codes, Reed Solomon codes, functionality calculations for block codes, multistage coding, and iterative coding.

Swanson on Internal Auditing Raising the Bar

This ebook offers concise observation on strategic concerns concerning the method inner audit is confirmed, deliberate and played. High-level concerns take a seat along useful assistance to make sure the ebook has an entice all degrees of inner audit administration and employees, as each one reader can dip right into a diversity of vital issues.

Multimedia Content Encryption: Techniques and Applications

The frequent use of snapshot, audio, and video information makes media content material safety more and more priceless and pressing. for max defense, it's now not adequate to basically regulate entry rights. so one can totally guard multimedia info from piracy or unauthorized use, it needs to be secured via encryption ahead of its transmission or distribution.

Smart TV Security: Media Playback and Digital Video Broadcast

This booklet discusses the rising subject of shrewdpermanent television safeguard, together with its implications on buyer privateness. the writer offers chapters at the structure and performance of clever TVs, a variety of assaults and defenses, and linked dangers for shoppers. This comprises the most recent assaults on broadcast-related electronic companies and integrated media playback, in addition to entry to built-in cameras and microphones.

Additional resources for CISSP For Dummies

Example text

See Chapter 3 for more information on earning CPE credits and maintaining your CISSP certification. Chapter 2 The Common Body of Knowledge (CBK) In This Chapter Getting up close and personal with the CBK Reviewing the ten domains of information security Understanding knowledge objectives and study topics The Common Body of Knowledge (CBK) defines a basic and common knowledge base for all security professionals, collectively referred to as the ten domains of information security. The CBK also provides minimum knowledge requirements for the Certified Information Systems Security Professional (CISSP) exam.

Then we provide some helpful guidance for your study efforts. Chapter 3 is a guide for actions and activities that you may consider pursuing to maintain your CISSP certification and your good standing as a security professional. Part II: Domains Part II contains the domains of the CBK and covers the core concepts and key information that you need to understand in order to pass the CISSP exam. A CISSP candidate must have practical work experience with many, but not necessarily all, of the concepts and technologies that we cover in this part.

This icon identifies general information and core concepts that are well worth committing to your non-volatile memory, your gray matter, or your noggin — along with anniversaries, birthdays, and other important stuff! You should certainly understand and review this information before taking your CISSP exam. Thank you for reading; we hope you enjoy the book; please take care of your writers! (Now, where’s that jar . . ) Seriously, this icon includes helpful suggestions and tidbits of useful information that may save you some time and headaches.

Download PDF sample

Rated 4.09 of 5 – based on 26 votes