Official (ISC)2 Guide to the SSCP CBK, Second Edition
Home > Computing and Information Technology > Information technology: general topics > Technologies: Legal aspects > Official (ISC)2 Guide to the SSCP CBK, Second Edition: (ISC2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition: (ISC2 Press)

Official (ISC)2 Guide to the SSCP CBK, Second Edition: (ISC2 Press)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The (ISC)²® Systems Security Certified Practitioner (SSCP®) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK® has quickly become the book that many of today’s security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)² CBK. Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text: Presents widely recognized best practices and techniques used by the world's most experienced administrators Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)² certification Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.

Table of Contents:
Access Controls; Paul Henry Access Control Concepts Architecture Models Identification, Authentication, Authorization, and Accountability Remote Access Methods Other Access Control Areas Sample Questions Cryptography; Christopher M. Nowell The Basics Symmetric Cryptography General Cryptography Specific Hashes Specific Protocols X.509 Sample Questions Malicious Code; Ken Dunham Introduction to Windows Malcode Security Management Malcode Naming Conventions and Types Brief History of Malcode Vectors of Infection Payloads Identifying Infections Behavioral Analysis of Malcode Malcode Mitigation Sample Questions Monitoring and Analysis; Mike Mackrill Policy, Controls, and Enforcement Audit Monitoring Sample Questions Networks and Telecommunications; Eric Waxvik and Samuel Chun Introduction to Networks and Telecommunications Network Protocols and Security Characteristics Data Communications and Network Infrastructure Components and Security Characteristics Wireless Local Area Networking Sample Questions Security Operations and Administration; C. Karen Stopford Security Program Objectives: The C-I-A Triad Code of Ethics Security Best Practices Designing a Security Architecture Security Program Frameworks Aligning Business, IT, and Security Security Architecture and Models Access Control Models Identity and Access Management Managing Privileged User Accounts Outsourcing Security and Managed Security Service Providers Business Partner Security Controls Security Policies, Standards, Guidelines, and Procedures Considerations for Safeguarding Confidentiality Privacy and Monitoring Information Life Cycle Protecting Confidentiality and Information Classification Information Handling Policy Information Collection Secure Information Storage Secure Output Record Retention and Disposal Disclosure Controls: Data Leakage Prevention Secure Application Development Web Application Vulnerabilities and Secure Development Practices Implementation and Release Management Systems Assurance and Controls Validation Certification and Accreditation Security Assurance Rating: Common Criteria Change Control Configuration Management Patch Management Monitoring System Integrity Endpoint Protection Thin Client Implementations Metrics Security Awareness and Training Review Questions References Risk, Response, and Recovery; Chris Trautwein Introduction to Risk Management Incident Response Forensics Recovery Appendix: Questions and Answers Access Controls Cryptography Malicious Code Monitoring and Analysis Networks and Telecommunications Risk, Response, and Recovery Security Operations and Administration Index

About the Author :
Harold F. Tipton, currently an independent consultant, was a past president of the International Information System Security Certification Consortium and a director of computer security for Rockwell International Corporation for about 15 years. He initiated the Rockwell computer and data security program in 1977 and then continued to administer, develop, enhance, and expand the program to accommodate the control needs produced by technological advances until his retirement from Rockwell in 1994. Tipton has been a member of the Information Systems Security Association (ISSA) since 1982. He was the president of the Los Angeles chapter in 1984, and the president of the national organization of ISSA (1987–1989). He was added to the ISSA Hall of Fame and the ISSA Honor Role in 2000. Tipton was a member of the National Institute for Standards and Technology (NIST), the Computer and Telecommunications Security Council, and the National Research Council Secure Systems Study Committee (for the National Academy of Science). He received his BS in engineering from the U.S. Naval Academy and his MA in personnel administration from George Washington University; he also received his certificate in computer science from the University of California, Irvine. He is a certified information system security professional (CISSP), ISSAP, & ISSMP. He has published several papers on information security issues for Auerbach Publications (Handbook of Information Security Management, Data Security Management, and Information Security Journal), National Academy of Sciences (Computers at Risk), Data Pro Reports, Elsevier, and ISSA (Access). He has been a speaker at all the major information security conferences including the Computer Security Institute, the ISSA Annual Working Conference, the Computer Security Workshop, MIS Conferences, AIS Security for Space Operations, DOE Computer Security Conference, National Computer Security Conference, IIA Security Conference, EDPAA, UCCEL Security & Audit Users Conference, and Industrial Security Awareness Conference. He has conducted/participated in information security seminars for (ISC)2, Frost & Sullivan, UCI, CSULB, System Exchange Seminars, and the Institute for International Research. He participated in the Ernst & Young video "Protecting Information Assets." He is currently serving as the editor of the Handbook of Information Security Management (Auerbach). He chairs the (ISC)2 CBK Committees and the QA Committee. He received the Computer Security Institute’s Lifetime Achievement Award in 1994, the (ISC)2’s Hal Tipton Award in 2001 and the (ISC)2 Founders Award in 2009.


Best Sellers


Product Details
  • ISBN-13: 9781439883440
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: Auerbach
  • Edition: New edition
  • No of Pages: 468
  • Series Title: ISC2 Press
  • ISBN-10: 1439883440
  • Publisher Date: 22 Sep 2011
  • Binding: Digital (delivered electronically)
  • Language: English
  • No of Pages: 468


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Official (ISC)2 Guide to the SSCP CBK, Second Edition: (ISC2 Press)
Taylor & Francis Ltd -
Official (ISC)2 Guide to the SSCP CBK, Second Edition: (ISC2 Press)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Official (ISC)2 Guide to the SSCP CBK, Second Edition: (ISC2 Press)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!