Official Isc2 Guide to the Sscp Cbk
商品資訊
ISBN13:9781439804834
出版社:Auerbach Pub UK
作者:Harold F. Tipton (EDT)
出版日:2010/12/08
裝訂/頁數:平裝/467頁
規格:23.5cm*15.9cm*3.2cm (高/寬/厚)
版次:2
定價
:NT$ 4484 元優惠價
:90 折 4036 元
若需訂購本書,請電洽客服 02-25006600[分機130、131]。
商品簡介
作者簡介
目次
相關商品
商品簡介
The (ISC)²® Systems Security Certified Practitioner (SSCP®) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK® has quickly become the book that many of today’s security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)² CBK.
Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text:
Presents widely recognized best practices and techniques used by the world's most experienced administrators
Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding
Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)² certification
Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.
Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text:
Presents widely recognized best practices and techniques used by the world's most experienced administrators
Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding
Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)² certification
Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.
作者簡介
Harold F. Tipton, currently an independent consultant, was a past president of the International Information System Security Certification Consortium and a director of computer security for Rockwell International Corporation for about 15 years. He initiated the Rockwell computer and data security program in 1977 and then continued to administer, develop, enhance, and expand the program to accommodate the control needs produced by technological advances until his retirement from Rockwell in 1994.
Tipton has been a member of the Information Systems Security Association (ISSA) since 1982. He was the president of the Los Angeles chapter in 1984, and the president of the national organization of ISSA (1987–1989). He was added to the ISSA Hall of Fame and the ISSA Honor Role in 2000.
Tipton was a member of the National Institute for Standards and Technology (NIST), the Computer and Telecommunications Security Council, and the National Research Council Secure Systems Study Committee (for the National Academy of Science). He received his BS in engineering from the U.S. Naval Academy and his MA in personnel administration from George Washington University; he also received his certificate in computer science from the University of California, Irvine. He is a certified information system security professional (CISSP), ISSAP, & ISSMP.
He has published several papers on information security issues for Auerbach Publications (Handbook of Information Security Management, Data Security Management, and Information Security Journal), National Academy of Sciences (Computers at Risk), Data Pro Reports, Elsevier, and ISSA (Access).
He has been a speaker at all the major information security conferences including the Computer Security Institute, the ISSA Annual Working Conference, the Computer Security Workshop, MIS Conferences, AIS Security for Space Operations, DOE Computer Security Conference, National Computer Security Conference, IIA Security Conference, EDPAA, UCCEL Security & Audit Users Conference, and Industrial Security Awareness Conference.
He has conducted/participated in information security seminars for (ISC)2, Frost & Sullivan, UCI, CSULB, System Exchange Seminars, and the Institute for International Research. He participated in the Ernst & Young video "Protecting Information Assets." He is currently serving as the editor of the Handbook of Information Security Management (Auerbach). He chairs the (ISC)2 CBK Committees and the QA Committee. He received the Computer Security Institute’s Lifetime Achievement Award in 1994, the (ISC)2’s Hal Tipton Award in 2001 and the (ISC)2 Founders Award in 2009.
Tipton has been a member of the Information Systems Security Association (ISSA) since 1982. He was the president of the Los Angeles chapter in 1984, and the president of the national organization of ISSA (1987–1989). He was added to the ISSA Hall of Fame and the ISSA Honor Role in 2000.
Tipton was a member of the National Institute for Standards and Technology (NIST), the Computer and Telecommunications Security Council, and the National Research Council Secure Systems Study Committee (for the National Academy of Science). He received his BS in engineering from the U.S. Naval Academy and his MA in personnel administration from George Washington University; he also received his certificate in computer science from the University of California, Irvine. He is a certified information system security professional (CISSP), ISSAP, & ISSMP.
He has published several papers on information security issues for Auerbach Publications (Handbook of Information Security Management, Data Security Management, and Information Security Journal), National Academy of Sciences (Computers at Risk), Data Pro Reports, Elsevier, and ISSA (Access).
He has been a speaker at all the major information security conferences including the Computer Security Institute, the ISSA Annual Working Conference, the Computer Security Workshop, MIS Conferences, AIS Security for Space Operations, DOE Computer Security Conference, National Computer Security Conference, IIA Security Conference, EDPAA, UCCEL Security & Audit Users Conference, and Industrial Security Awareness Conference.
He has conducted/participated in information security seminars for (ISC)2, Frost & Sullivan, UCI, CSULB, System Exchange Seminars, and the Institute for International Research. He participated in the Ernst & Young video "Protecting Information Assets." He is currently serving as the editor of the Handbook of Information Security Management (Auerbach). He chairs the (ISC)2 CBK Committees and the QA Committee. He received the Computer Security Institute’s Lifetime Achievement Award in 1994, the (ISC)2’s Hal Tipton Award in 2001 and the (ISC)2 Founders Award in 2009.
目次
Access Controls; Paul Henry Access Control ConceptsArchitecture ModelsIdentification, Authentication, Authorization, and AccountabilityRemote Access MethodsOther Access Control AreasSample Questions
Cryptography; Christopher M. NowellThe BasicsSymmetric CryptographyGeneral CryptographySpecific HashesSpecific ProtocolsX.509Sample Questions
Malicious Code; Ken DunhamIntroduction to Windows Malcode Security ManagementMalcode Naming Conventions and TypesBrief History of MalcodeVectors of InfectionPayloadsIdentifying InfectionsBehavioral Analysis of MalcodeMalcode MitigationSample Questions
Monitoring and Analysis; Mike MackrillPolicy, Controls, and EnforcementAuditMonitoringSample Questions
Networks and Telecommunications; Eric Waxvik and Samuel ChunIntroduction to Networks and TelecommunicationsNetwork Protocols and Security CharacteristicsData Communications and Network Infrastructure Components and Security CharacteristicsWireless Local Area NetworkingSample Questions
Security Operations and Administration; C. Karen StopfordSecurity Program Objectives: The C-I-A TriadCode of EthicsSecurity Best PracticesDesigning a Security ArchitectureSecurity Program FrameworksAligning Business, IT, and SecuritySecurity Architecture and ModelsAccess Control ModelsIdentity and Access ManagementManaging Privileged User AccountsOutsourcing Security and Managed Security Service ProvidersBusiness Partner Security ControlsSecurity Policies, Standards, Guidelines, and ProceduresConsiderations for Safeguarding ConfidentialityPrivacy and MonitoringInformation Life CycleProtecting Confidentiality and Information ClassificationInformation Handling Policy Information CollectionSecure Information StorageSecure OutputRecord Retention and DisposalDisclosure Controls: Data Leakage PreventionSecure Application DevelopmentWeb Application Vulnerabilities and Secure Development PracticesImplementation and Release ManagementSystems Assurance and Controls ValidationCertification and AccreditationSecurity Assurance Rating: Common CriteriaChange ControlConfiguration ManagementPatch ManagementMonitoring System IntegrityEndpoint ProtectionThin Client ImplementationsMetricsSecurity Awareness and TrainingReview QuestionsReferences
Risk, Response, and Recovery; Chris TrautweinIntroduction to Risk ManagementIncident ResponseForensicsRecovery
Appendix: Questions and AnswersAccess ControlsCryptographyMalicious CodeMonitoring and AnalysisNetworks and TelecommunicationsRisk, Response, and RecoverySecurity Operations and Administration
Index
Cryptography; Christopher M. NowellThe BasicsSymmetric CryptographyGeneral CryptographySpecific HashesSpecific ProtocolsX.509Sample Questions
Malicious Code; Ken DunhamIntroduction to Windows Malcode Security ManagementMalcode Naming Conventions and TypesBrief History of MalcodeVectors of InfectionPayloadsIdentifying InfectionsBehavioral Analysis of MalcodeMalcode MitigationSample Questions
Monitoring and Analysis; Mike MackrillPolicy, Controls, and EnforcementAuditMonitoringSample Questions
Networks and Telecommunications; Eric Waxvik and Samuel ChunIntroduction to Networks and TelecommunicationsNetwork Protocols and Security CharacteristicsData Communications and Network Infrastructure Components and Security CharacteristicsWireless Local Area NetworkingSample Questions
Security Operations and Administration; C. Karen StopfordSecurity Program Objectives: The C-I-A TriadCode of EthicsSecurity Best PracticesDesigning a Security ArchitectureSecurity Program FrameworksAligning Business, IT, and SecuritySecurity Architecture and ModelsAccess Control ModelsIdentity and Access ManagementManaging Privileged User AccountsOutsourcing Security and Managed Security Service ProvidersBusiness Partner Security ControlsSecurity Policies, Standards, Guidelines, and ProceduresConsiderations for Safeguarding ConfidentialityPrivacy and MonitoringInformation Life CycleProtecting Confidentiality and Information ClassificationInformation Handling Policy Information CollectionSecure Information StorageSecure OutputRecord Retention and DisposalDisclosure Controls: Data Leakage PreventionSecure Application DevelopmentWeb Application Vulnerabilities and Secure Development PracticesImplementation and Release ManagementSystems Assurance and Controls ValidationCertification and AccreditationSecurity Assurance Rating: Common CriteriaChange ControlConfiguration ManagementPatch ManagementMonitoring System IntegrityEndpoint ProtectionThin Client ImplementationsMetricsSecurity Awareness and TrainingReview QuestionsReferences
Risk, Response, and Recovery; Chris TrautweinIntroduction to Risk ManagementIncident ResponseForensicsRecovery
Appendix: Questions and AnswersAccess ControlsCryptographyMalicious CodeMonitoring and AnalysisNetworks and TelecommunicationsRisk, Response, and RecoverySecurity Operations and Administration
Index
主題書展
更多
主題書展
更多書展今日66折
您曾經瀏覽過的商品
購物須知
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。