Atnaujinkite slapukų nuostatas

El. knyga: Official (ISC)2® Guide to the CISSP®-ISSMP® CBK® 2nd edition [Taylor & Francis e-book]

  • Formatas: 456 pages, 16 Tables, black and white; 68 Illustrations, black and white
  • Serija: ISC2 Press
  • Išleidimo metai: 14-May-2015
  • Leidėjas: Auerbach
  • ISBN-13: 9780429192364
Kitos knygos pagal šią temą:
  • Taylor & Francis e-book
  • Kaina: 110,79 €*
  • * this price gives unlimited concurrent access for unlimited time
  • Standartinė kaina: 158,27 €
  • Sutaupote 30%
  • Formatas: 456 pages, 16 Tables, black and white; 68 Illustrations, black and white
  • Serija: ISC2 Press
  • Išleidimo metai: 14-May-2015
  • Leidėjas: Auerbach
  • ISBN-13: 9780429192364
Kitos knygos pagal šią temą:

The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the ISSMP need to demonstrate a thorough understanding of the five domains of the ISSMP Common Body of Knowledge (CBK®), along with the ability to apply this in-depth knowledge to establish, present, and govern information security programs, while demonstrating management and leadership skills.

Supplying an authoritative review of key concepts and requirements, the Official (ISC) Guide to the CISSP®-ISSMP® CBK®, Second Edition is both up to date and relevant. This book provides a comprehensive review of the five domains in the ISSMP CBK: Security Leadership and Management, Security Lifecycle Management, Security Compliance Management, Contingency Management, and Law, Ethics, and Incident Management.

Numerous illustrated examples and practical exercises are included in this book to demonstrate concepts and real-life scenarios. Endorsed by (ISC)2 and compiled and reviewed by ISSMPs and industry luminaries around the world, this book provides unrivaled preparation for the exam. Earning your ISSMP is a deserving achievement that should ultimately help to enhance your career path and give you a competitive advantage.

Foreword ix
Introduction xi
Editors xvii
Contributors xix
Domain 1 Security Leadership & Management
Security Leadership & Management
1(4)
Mission Statements
5(3)
Business Functions
8(10)
Group Business Processes
8(4)
Cultural Expectations
12(6)
Define the Security Governance Structure
18(69)
What Is Security Governance?
18(1)
Why Is Security Governance Necessary?
18(1)
Security Governance Roles
19(1)
Information Security Concepts
20(13)
System Development Life Cycle (SDLC)
33(1)
Enterprise System Security Framework
34(6)
Service Management Agreements
40(3)
Other Forms of Agreements
43(1)
Risk Management Program
43(10)
Service Level Agreement Key Performance Indicators
53(7)
Information System Security Cycles
60(2)
Plan of Action and Milestones
62(2)
Managing the Security Organization
64(2)
Roles and Responsibilities
66(7)
Security Professional's Goals are to
73(1)
Security Professional's Goals are NOT to
73(4)
Security Awareness, Education, and Training
77(10)
Domain 2 Security Lifecycle Management
Security Lifecycle Management
87(4)
Managing Security in Different Methods of Systems Development
91(9)
Systems Development Life Cycle
91(9)
Approval of Security Design
100(59)
Business Unit Priorities
100(3)
Hardware
103(4)
Operating System
107(3)
Networks
110(11)
Web Servers
121(5)
Other Applications
126(1)
Project under Development
127(3)
Security Principles
130(11)
Service-Oriented Architecture Security
141(2)
System Testing
143(1)
Component Testing
143(1)
Integrated System Testing
143(1)
Penetration Testing
143(1)
Certification and Accreditation
144(4)
Prioritizing Threats and Vulnerabilities
148(11)
Domain 3 Security Compliance Management
Security Compliance Management
159(4)
The Cyber Domain
163(2)
Business Perspective
163(2)
Compliance
165(84)
Compliance Perspectives
167(8)
Enterprise Security Standard
175(6)
People
181(11)
Service Level Agreements
192(10)
Process
202(5)
Version Control
207(14)
Technology
221(13)
Environment
234(4)
Mission Assurance
238(11)
Domain 4 Contingency Management
Contingency Management
249(10)
Contingency Plans
259(64)
Types of Plans
259(3)
Policy Development and Strategy Planning
262(9)
Business Continuity Plan and Disaster Recovery Plan---Project Planning
271(2)
The Business Impact Analysis (BIA) Process
273(4)
Planning, Designing, and Development of Plans
277(8)
Risk Assessment and Management
285(12)
Contingency Management Summary
297(11)
Communications
308(6)
Survivability
314(9)
Domain 5 Law, Ethics, and Incident Management
Law, Ethics, and Incident Management
323(4)
Information Security Laws
327(40)
Licensing
329(11)
Intellectual Property
340(8)
Import/Export Laws
348(1)
Liability
349(3)
Privacy Law
352(4)
Transborder Data Flow
356(11)
Security Incident Management Process
367(26)
Interviewing and Fact-Finding
373(4)
Professional Ethics
377(6)
FAQs
383(10)
Appendix A Answers to Domain Review Questions 393(34)
Index 427
(ISC)²® Corporate