- You'll save an extra 5% on Books purchased from Amazon.ca, now through July 29th. No code necessary, discount applied at checkout. Here's how (restrictions apply)
CISSP Training Guide Paperback – CD, Nov 18 2002
Special Offers and Product Promotions
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
From the Back Cover
The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multiple choice questions, covering topics such as Access Control Systems, Cryptography, and Security Management Practices, and is administered by the International Information Systems Security Certification Consortium or (ISC)2. (ISC)2 promotes the CISSP exam as an aid to evaluating personnel performing information security functions. Candidates for this exam are typically network security professionals and system administrators with at least 3 years of direct work experience in one or more of the 10 test domains. This book maps to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams. In addition, the CD includes PrepLogic Practice Tests, Preview Edition, making it the ultimate guide for those studying for the CISSP exam.
About the Author
Roberta Bragg, CISSP, MCSE, and the original Security Evangelist, is a veteran of more than 25 years in IT. Her technical experience ranges from programming to systems administration and Windows network security design. She is an internationally acclaimed author and lecturer on Windows security.
Scott Barman is currently an information security and systems architecture analyst for The MITRE Corporation (http://www.mitre.org) working with the MITRE team to help the IRS modernize its IT infrastructure. He has been involved with information security for almost 20 years, nurturing the evolution of systems and their security requirements for commercial organizations and government agencies. Since the explosion of the Internet, and prior to joining MITRE, he has focused on various areas of security and policy development for many organizations in the Washington, D.C. area. Scott earned his undergraduate degree from the University of Georgia and a Master of Information Systems Management with a concentration in information security management from Carnegie Mellon University (http://www.mism.cmu.edu).
Philip Fites has worked for more than 34 years in informatics, from computer operations to business and project management. His current focus includes information systems security theory and practice. Since the early 1980s, a lifelong interest in information security has been transformed into a commitment to research on integrity and other issues of security in information systems, combined with a practical focus on applying his expertise to help clients clarify and achieve security objectives.
Philip holds a bachelor of science in mathematics and an M.B.A. and studied for a Ph.D. in computing science at Queen's University. He is coauthor of Control and Security of Computer Information Systems, The Computer Virus Crisis, and Information Systems Security: A Practitioner's Reference, and he has published a number of works on various topics in computer security, software research, and educational planning methodology in various professional and industry publications. He has served as a director and president of the International Information Systems Security Certification Consortium (ISC)2. He is a member of the Standards Council of Canada's Canadian Advisory Committee on Information Technology.
Wesley J. Noonan is currently a senior quality assurance representative with BMC Software, Inc. (http://www.bmc.com) working on its network management product line. Wes got his start in the United States Marine Corps working on its Banyan VINES network and has spent the past 10 years building, maintaining, and securing corporate networks ranging in size from 25 to 25,000 users. Wes is also an active trainer, developing and teaching his own custom, Cisco-based routing and switching curriculum. His certifications include MCSE, CCNA, CCDA, and NNCSS.
Benjamin Wright, recognized the world over as one of the leading lawyers in e-commerce, is the founding author of The Law of Electronic Commerce, a comprehensive book on the legality of electronic transactions, published by Aspen Law & Business. A graduate of Georgetown University Law Center, he is an independent attorney practicing computer security and e-commercial law in Dallas, Texas.
Since 1988, he has delivered more than 500 speeches on e-commerce, privacy, and computer security and has been quoted in publications around the globe, from the Wall Street Journal to the Sydney Morning Herald. On May 26, 2001, he was featured in the 30-minute documentary The Cutting Edge Technology Report: Electronic Signatures, nationally broadcast on CNBC.
Guy Bruneau, GSEC, GCIA, GCUX is a senior security consultant with InfoPeople Security Solutions, Inc. He works within InfoPeople's security practice assisting clients with their managed security services, computer intrusion detection operations and deployment, network security auditing, incident response and reporting, and so on. He has firsthand knowledge in the use and hardening of Cisco Secure IDS, Shadow IDS, and Snort IDS, among others. He has been a SANS instructor and speaker and is the author of the IDIC course Introduction to Logfile Analysis. He is an authorized SANS Unix security grader and is presently serving as the chair of the SANS GIAC Certified Intrusion Analyst Advisory Board. He is the author of the OS hardened Shadow IDS platform based on NSWC's Shadow version 1.7 (available at http://www.whitehats.ca). In his spare time, he has worked as a technical reviewer for New Riders Publishing. Lawrence S. Paccone is a principal national/systems security analyst at Northrop Grumman Information Technology TASC. As both a technical lead and project manager, he has worked in the Internet and network/systems security arena for more than 8 years. He has been the technical lead for several network security projects supporting a government network/systems security research and development laboratory. Prior to that, he worked for 5 years at The Analytical Sciences Corporation (TASC) as a national security analyst assessing conventional military force structures. He has an M.S. in information systems, an M.A. in international relations, and a B.A. in political science. He has completed eight professional certifications in network and systems security, internetworking, wide area networking, Cisco routing/switching, Unix, and Windows NT. He also has been a technical editor for eight IT security books that are currently in publication.
Patrick "Swissman" Ramseier, CCNA, CISSP is a systems engineer at OKENA, makers of the StormSystem Intrusion Prevention System. OKENA has been delivering breakthrough security software products that proactively preserve the operational integrity of applications and host systems. OKENA StormSystem is a system of seamlessly integrated security products that act in unison to prevent existing and unknown attacks without relying on attack signatures. Patrick started out as a Unix system administrator. Over the past 14 years, he has been involved with corporate-level security design; architecture reviews; vulnerability assessments; VPN support; physical, network, and operating system security (Unix-Solaris, Linux, BSD, and Windows NT/2000); training; research; and post- and pre-sales. He has a B.A. in business and is working concurrently on his master's and doctorate in computer science.
Top Customer Reviews
After having done a few 'domains' with the Krutz/Vines book I switched to this guide (available on O'Reilly's Safari site). I like the style of the chapters, the way the domains are covered, the topics are well explained, yet it is lacking on factual details. One strong point is the author's use of sample case situation to emphasis the review points.
Over the past week, this book has become my first approach to each domain, using the Krutz/Vines as a very quick checkup before trying the questions from the CISSP Prep Guide.
According to me, the preperation for the CISSP cannot be based solely on a single book. So I do recommend using this CISSP Training Guide as the center stage for training. As the title says it's a Guide, and will put down the right foundations for each domain. Then you could pick information in other books that have more details. I would also highly recommend to anyone preparing for the CISSP, to take the time to supplemented the knowledge by doing searches on the internet for supporting documentation, which Roberta Bragg gives as URL pointers at the end of each chapter.
It is vague where details are important, unclear and poorly written where conciseness and clarity are needed, and it presents misleading or even incorrect information in areas in which the author is clearly not knowledgeable. In places it makes sweeping generalizations with very little if any validity; on the basis of my own twenty years in the IT industry, I suspect it contains broad swathes of personal opinion not identified as such.
The practice quizzes are full of the kind of multiple choice question in which two or three of the possible answers could be correct; the overall tone of the text reminds me of the sort of technical book in which the author uses the biggest words at his/her command, in the vaguest possible way, in an attempt to stun the reader into being impressed by the author's ability to say nothing about everything.
Although I have unfortunately come to expect this kind of product from Que and its ilk, I feel cheated out of the $70 I spent on this book, and I mourn for the unnecessarily large number of trees that died to produce it. Worse yet, my faith in the value of CISSP certification, and to some extent the general reputation of security consultants, is shaken. Please, go buy some other book.
While not cheap, ... the 'CISSP Training Guide' by Roberta Bragg is definitely an excellent resource for anyone preparing for the CISSP examination.
This book, like all of the other CISSP prep guides is organized according to the 10 domains of the CBK (Common Body of Knowledge).
Where this book shines is in its organization and presentation of the material. The material itself is presented in a well-organized and easily readable style. Other titles are written in a much more technical style, which make memorization of the concepts more difficult. But Roberta Bragg has written her 'CISSP Training Guide' in a very readable and clear manner.
The book also has a number of case studies that attempt to make the material more understandable by presenting real-world scenarios. The case studies do a fine job of taking often-abstract security concepts and mapping them into understandable ideas.
The CD-ROM is helpful, but there are many pop-ups requesting the test taker to pay to upgrade to a premium edition of the test.
Overall, the 'CISSP Training Guide' is one of the better CISSP prep guides. Anyone looking for a solid CISSP preparation resource should definitely consider this book.
Most recent customer reviews
I was skeptical after seeing that last review, but after reading much of the book, I'm not sure what that last reviewer is talking about. Read morePublished on Oct. 31 2003
I personally liked the way this book was organized and found it easy to read and understand.
The information was helpful in preparing for the CISSP exam but I must caution... Read more
Look for similar items by category
- Books > Computers & Technology > Certification Central > Exams > CISSP
- Books > Computers & Technology > Databases
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs
- Books > Computers & Technology > Web Development > Security & Encryption > Encryption
- Books > Education & Reference > Test Preparation > Testing
- Books > Qualifying Textbooks - Fall 2007 > Computers & Internet
- Books > Textbooks > Computer Science & Information Systems > Computer Science
- Books > Textbooks > Computer Science & Information Systems > Networking
- Books > Textbooks > Test Prep & Study Guides