The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industryas first and only CBKAr, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as the basis for (ISC)2as education and certification programs. Unique and exceptionally thorough, the Official (ISC)2Ar Guide to the CISSPArCBKArprovides a better understanding of the CISSP CBK a a collection of topics relevant to information security professionals around the world. Although the book still contains the ten domains of the CISSP, some of the domain titles have been revised to reflect evolving terminology and changing emphasis in the security professionalas day-to-day environment. The ten domains include information security and risk management, access control, cryptography, physical (environmental) security, security architecture and design, business continuity (BCP) and disaster recovery planning (DRP), telecommunications and network security, application security, operations security, legal, regulations, and compliance and investigations. Endorsed by the (ISC)2, this valuable resource follows the newly revised CISSP CBK, providing reliable, current, and thorough information. Moreover, the Official (ISC)2Ar Guide to the CISSPAr CBKAr helps information security professionals gain awareness of the requirements of their profession and acquire knowledge validated by the CISSP certification. The book is packaged with a CD that is an invaluable tool for those seeking certification. It includes sample exams that simulate the actual exam, providing the same number and types of questions with the same allotment of time allowed. It even grades the exam, provides correct answers, and identifies areas where more study is needed.pie access permissions can be applied to a single object, such as owner, group, public, system, or administrator, ... It specifies a list of users who are allowed access to each object and is often implemented with access control matrices ( ACMs).
|Title||:||Official (ISC)2 Guide to the CISSP CBK|
|Author||:||Steven Hernandez, CISSP|
|Publisher||:||CRC Press - 2006-11-14|