Advanced CISSP Prep Guide: Exam Q & A
×
Success!
×
Error!
×
Information !
Rights Contact Login For More Details
- Wiley
More About This Title Advanced CISSP Prep Guide: Exam Q & A
- English
English
RONALD L. KRUTZ, PhD, PE, CISSP, is Director of Privacy for Corbett Technologies, specializing in information assurance and privacy appraisal methodologies. Dr. Krutz is also a distinguished visiting lecturer in the University of New Haven Computer Forensics Program. He was a lead instructor for the CISSP CBK review seminars, former associate director of the Carnegie Mellon Research Institute (CMRI), and a faculty member in the Carnegie Mellon University Department of Electrical and Computer Engineering. Krutz is the author of four previous books, including The CISSP Prep Guide (Wiley).
RUSSELL DEAN VINES, CISSP, CCNA, MCSE, MCNE, is President and founder of the RDV Group Inc., a New York City-based security consulting services firm. His company is active in detecting, preventing, and solving security vulnerabilities for clients in government, finance, and new media organizations. He directed the Security Consulting Services Group for Realtech Systems Corporation, and managed international information networks for CBS/Fox Video, Inc. Vines is the author of Wireless Security Essentials and coauthor of The CISSP Prep Guide (both from Wiley).
RUSSELL DEAN VINES, CISSP, CCNA, MCSE, MCNE, is President and founder of the RDV Group Inc., a New York City-based security consulting services firm. His company is active in detecting, preventing, and solving security vulnerabilities for clients in government, finance, and new media organizations. He directed the Security Consulting Services Group for Realtech Systems Corporation, and managed international information networks for CBS/Fox Video, Inc. Vines is the author of Wireless Security Essentials and coauthor of The CISSP Prep Guide (both from Wiley).
- English
English
Acknowledgments.
About the Authors.
Introduction.
Chapter 1. Security Management.
Chapter 2. Access Control.
Chapter 3. Telecommunications and Network Security.
Chapter 4. Crytography.
Chapter 5. Security Architecture and Models.
Chapter 6. Operations Security.
Chapter 7. Applications and Systems Development.
Chapter 8. Business Continuity Planning--Disaster Recovery Planning.
Chapter 9. Law, Investigation and Ethics.
Chapter 10. Physical Security.
Appendix A. Answers to Sample Questions.
Appendix B. What's on the CD-ROM.
Index.
About the Authors.
Introduction.
Chapter 1. Security Management.
Chapter 2. Access Control.
Chapter 3. Telecommunications and Network Security.
Chapter 4. Crytography.
Chapter 5. Security Architecture and Models.
Chapter 6. Operations Security.
Chapter 7. Applications and Systems Development.
Chapter 8. Business Continuity Planning--Disaster Recovery Planning.
Chapter 9. Law, Investigation and Ethics.
Chapter 10. Physical Security.
Appendix A. Answers to Sample Questions.
Appendix B. What's on the CD-ROM.
Index.