Vous voulez voir cette page en français ? Cliquez ici.


or
Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

CISSP Training Guide [Paperback]

Roberta Bragg
3.8 out of 5 stars  See all reviews (6 customer reviews)
List Price: CDN$ 78.99
Price: CDN$ 49.76 & FREE Shipping. Details
You Save: CDN$ 29.23 (37%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Usually ships within 3 to 6 weeks.
Ships from and sold by Amazon.ca. Gift-wrap available.
Join Amazon Student in Canada


Book Description

Nov. 18 2002 078972801X 978-0789728012 1

The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography, and Security Management Practices, and is administered by the International Information Systems Security Certification Consortium or (ISC)2. (ISC)2 promotes the CISSP exam as an aid to evaluating personnel performing information security functions. Candidates for this exam are typically network security professionals and system administrators with at least 3 years of direct work experience in one or more of the 10 test domains. This book maps to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams. In addition, the CD includes PrepLogic Practice Tests, Preview Edition, making it the ultimate guide for those studying for the CISSP exam.


Product Details


Product Description

From the Back Cover

The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography, and Security Management Practices, and is administered by the International Information Systems Security Certification Consortium or (ISC)2. (ISC)2 promotes the CISSP exam as an aid to evaluating personnel performing information security functions. Candidates for this exam are typically network security professionals and system administrators with at least 3 years of direct work experience in one or more of the 10 test domains. This book maps to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams. In addition, the CD includes PrepLogic Practice Tests, Preview Edition, making it the ultimate guide for those studying for the CISSP exam.

About the Author

Roberta Bragg, CISSP, MCSE, and the original Security Evangelist, is a veteran of more than 25 years in IT. Her technical experience ranges from programming to systems administration and Windows network security design. She is an internationally acclaimed author and lecturer on Windows security.

Scott Barman is currently an information security and systems architecture analyst for The MITRE Corporation (http://www.mitre.org) working with the MITRE team to help the IRS modernize its IT infrastructure. He has been involved with information security for almost 20 years, nurturing the evolution of systems and their security requirements for commercial organizations and government agencies. Since the explosion of the Internet, and prior to joining MITRE, he has focused on various areas of security and policy development for many organizations in the Washington, D.C. area. Scott earned his undergraduate degree from the University of Georgia and a Master of Information Systems Management with a concentration in information security management from Carnegie Mellon University (http://www.mism.cmu.edu).

Philip Fites has worked for more than 34 years in informatics, from computer operations to business and project management. His current focus includes information systems security theory and practice. Since the early 1980s, a lifelong interest in information security has been transformed into a commitment to research on integrity and other issues of security in information systems, combined with a practical focus on applying his expertise to help clients clarify and achieve security objectives.

Philip holds a bachelor of science in mathematics and an M.B.A. and studied for a Ph.D. in computing science at Queen's University. He is coauthor of Control and Security of Computer Information Systems, The Computer Virus Crisis, and Information Systems Security: A Practitioner's Reference, and he has published a number of works on various topics in computer security, software research, and educational planning methodology in various professional and industry publications. He has served as a director and president of the International Information Systems Security Certification Consortium (ISC)2. He is a member of the Standards Council of Canada's Canadian Advisory Committee on Information Technology.

Wesley J. Noonan is currently a senior quality assurance representative with BMC Software, Inc. (http://www.bmc.com) working on its network management product line. Wes got his start in the United States Marine Corps working on its Banyan VINES network and has spent the past 10 years building, maintaining, and securing corporate networks ranging in size from 25 to 25,000 users. Wes is also an active trainer, developing and teaching his own custom, Cisco-based routing and switching curriculum. His certifications include MCSE, CCNA, CCDA, and NNCSS.

Benjamin Wright, recognized the world over as one of the leading lawyers in e-commerce, is the founding author of The Law of Electronic Commerce, a comprehensive book on the legality of electronic transactions, published by Aspen Law & Business. A graduate of Georgetown University Law Center, he is an independent attorney practicing computer security and e-commercial law in Dallas, Texas.

Since 1988, he has delivered more than 500 speeches on e-commerce, privacy, and computer security and has been quoted in publications around the globe, from the Wall Street Journal to the Sydney Morning Herald. On May 26, 2001, he was featured in the 30-minute documentary The Cutting Edge Technology Report: Electronic Signatures, nationally broadcast on CNBC.

Guy Bruneau, GSEC, GCIA, GCUX is a senior security consultant with InfoPeople Security Solutions, Inc. He works within InfoPeople's security practice assisting clients with their managed security services, computer intrusion detection operations and deployment, network security auditing, incident response and reporting, and so on. He has firsthand knowledge in the use and hardening of Cisco Secure IDS, Shadow IDS, and Snort IDS, among others. He has been a SANS instructor and speaker and is the author of the IDIC course Introduction to Logfile Analysis. He is an authorized SANS Unix security grader and is presently serving as the chair of the SANS GIAC Certified Intrusion Analyst Advisory Board. He is the author of the OS hardened Shadow IDS platform based on NSWC's Shadow version 1.7 (available at http://www.whitehats.ca). In his spare time, he has worked as a technical reviewer for New Riders Publishing. Lawrence S. Paccone is a principal national/systems security analyst at Northrop Grumman Information Technology TASC. As both a technical lead and project manager, he has worked in the Internet and network/systems security arena for more than 8 years. He has been the technical lead for several network security projects supporting a government network/systems security research and development laboratory. Prior to that, he worked for 5 years at The Analytical Sciences Corporation (TASC) as a national security analyst assessing conventional military force structures. He has an M.S. in information systems, an M.A. in international relations, and a B.A. in political science. He has completed eight professional certifications in network and systems security, internetworking, wide area networking, Cisco routing/switching, Unix, and Windows NT. He also has been a technical editor for eight IT security books that are currently in publication.

Patrick "Swissman" Ramseier, CCNA, CISSP is a systems engineer at OKENA, makers of the StormSystem Intrusion Prevention System. OKENA has been delivering breakthrough security software products that proactively preserve the operational integrity of applications and host systems. OKENA StormSystem is a system of seamlessly integrated security products that act in unison to prevent existing and unknown attacks without relying on attack signatures. Patrick started out as a Unix system administrator. Over the past 14 years, he has been involved with corporate-level security design; architecture reviews; vulnerability assessments; VPN support; physical, network, and operating system security (Unix-Solaris, Linux, BSD, and Windows NT/2000); training; research; and post- and pre-sales. He has a B.A. in business and is working concurrently on his master's and doctorate in computer science.


Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

Most helpful customer reviews
5.0 out of 5 stars Good reading, great 'domain' explenations. March 18 2004
Format:Paperback
I'm preparing for the CISSP, so I do have a few different books lying around (CISSP Examination Textbooks by S Vallabhaneni = Awful reading, but good factual references; CISSP Prep Guide: Gold Edition by Krutz & Vines = Good reading, Great questions and decent references) and this book.
After having done a few 'domains' with the Krutz/Vines book I switched to this guide (available on O'Reilly's Safari site). I like the style of the chapters, the way the domains are covered, the topics are well explained, yet it is lacking on factual details. One strong point is the author's use of sample case situation to emphasis the review points.
Over the past week, this book has become my first approach to each domain, using the Krutz/Vines as a very quick checkup before trying the questions from the CISSP Prep Guide.
According to me, the preperation for the CISSP cannot be based solely on a single book. So I do recommend using this CISSP Training Guide as the center stage for training. As the title says it's a Guide, and will put down the right foundations for each domain. Then you could pick information in other books that have more details. I would also highly recommend to anyone preparing for the CISSP, to take the time to supplemented the knowledge by doing searches on the internet for supporting documentation, which Roberta Bragg gives as URL pointers at the end of each chapter.
Was this review helpful to you?
5.0 out of 5 stars Great Book Oct. 31 2003
By A Customer
Format:Paperback
I was skeptical after seeing that last review, but after reading much of the book, I'm not sure what that last reviewer is talking about. If you're new to security CISSP isn't for you -- try Security+ -- nor is this book. If you're in over your head, don't blame the book.
Was this review helpful to you?
1.0 out of 5 stars Yecch. Sept. 22 2003
By A Customer
Format:Paperback
This is an awful book.
It is vague where details are important, unclear and poorly written where conciseness and clarity are needed, and it presents misleading or even incorrect information in areas in which the author is clearly not knowledgeable. In places it makes sweeping generalizations with very little if any validity; on the basis of my own twenty years in the IT industry, I suspect it contains broad swathes of personal opinion not identified as such.
The practice quizzes are full of the kind of multiple choice question in which two or three of the possible answers could be correct; the overall tone of the text reminds me of the sort of technical book in which the author uses the biggest words at his/her command, in the vaguest possible way, in an attempt to stun the reader into being impressed by the author's ability to say nothing about everything.
Although I have unfortunately come to expect this kind of product from Que and its ilk, I feel cheated out of the $70 I spent on this book, and I mourn for the unnecessarily large number of trees that died to produce it. Worse yet, my faith in the value of CISSP certification, and to some extent the general reputation of security consultants, is shaken. Please, go buy some other book.
Was this review helpful to you?
Want to see more reviews on this item?

Look for similar items by category


Feedback