Description
Official (ISC)2® Guide to the ISSAP® CBK (2nd Ed.)
(ISC)2 Press Series
Coordinator: Corporate (ISC)²
Language: EnglishSubjects for Official (ISC)2® Guide to the ISSAP® CBK:
Keywords
Security Architect; Access Control Systems and Methodologies; EAL; Physical Security Integration; Packet Filtering; Technology-Related Business Continuity Planning and Disaster Recovery Planning; Access Control Mechanism; Telecommunications and Network Security; Crypto Period; Cryptography; BIA; Block Cipher; L2TP Tunnel; PKI Registration; Private Key; Centralized Access Control; IP Address; Sip; Stream Ciphers; NIST SP; Organization’s Standard Software Process; MCU; Cryptographic Module; Sensitive Information; Delta Crl; Public Key; BCP; IPv6 Address; Hash Function; Job Function
Support: Print on demand
Description
/li>Contents
/li>Biography
/li>
Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.
Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the Official (ISC)2® Guide to the ISSAP® CBK®,Second Edition provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations.
Newly Enhanced Design ? This Guide Has It All!
- Only guide endorsed by (ISC)2
- Most up-to-date CISSP-ISSAP CBK
- Evolving terminology and changing requirements for security professionals
- Practical examples that illustrate how to apply concepts in real-life situations
- Chapter outlines and objectives
- Review questions and answers
- References to free study resources
Read It. Study It. Refer to It Often.
Requirements Analysis. Access Control. Cryptography. Physical Security. BCP/DRP. Telecommunications and Network Security