undrgrnd Cliquez ici Baby KDP nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos Beauty nav_egg15 Cliquez ici Acheter Fire Shop Kindle cliquez_ici Jeux Vidéo Gifts
Acheter d'occasion
EUR 46,33
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par Nearfine
État: D'occasion: Très bon
Commentaire: Petites traces d'usage. Livraison prévue entre 2 et 3 semaines.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Official (ISC)2® Guide to the ISSAP® CBK (Anglais) Relié – 1 novembre 2010

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 55,61 EUR 46,33

Il y a une édition plus récente de cet article:

Idées cadeaux Livres Idées cadeaux Livres

Idées cadeaux Livres
Retrouvez toutes nos idées cadeaux dans notre Boutique Livres de Noël.

Offres spéciales et liens associés

Descriptions du produit

Présentation de l'éditeur

Candidates for the CISSP-ISSAP® professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP® CBK®, but also the ability to apply this in-depth knowledge to develop a detailed security architecture that meets all requirements.

Supplying an authoritative review of the key concepts and requirements of the ISSAP® CBK®, the Official (ISC) Guide to the ISSAP® CBK® provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Requirements Analysis, Access Control, Cryptography, Physical Security, BCP/DRP, and Telecommunications and Network Security.

  • Endorsed by the (ISC)
  • Follows the newly revised CISSP-ISSAP® CBK®
  • Reflects the evolving terminology and changing requirements for security professionals

With chapters written by those shaping this relatively new and rapidly developing field, this book is the only officially endorsed guide to the CISSP-ISSAP® CBK®. Read it, study it, and refer to it often as it will help improve your chances of achieving certification the first time around. Following certification it will serve as an authoritative reference for constructing architectures that are compliant with the latest security requirements.

Biographie de l'auteur

About the Authors:

Alex Golod, CISSP, is a senior security consultant with 29 years of experience for one of the Fortune 100 IT firms. He has focused the last 12 years of his career in information security. Alex’s many responsibilities include architecture, engineering, and operations of security solutions. His broad area of expertise  covers application, network and data security, as well as risk analysis and mitigation.

Paul Baker, CPP, is a security manager with more than 30 years of extensive experience in all phases of law enforcement and industrial security. He holds a Doctorate in Strategic Leadership from Regent University, along with a Master of Science in Criminal Justice from Troy University, and is a Certified Protection Professional (CPP). Dr. Baker spent 6 years in the U.S. Marine Corps and has retired from the Maryland State Police. Dr. Baker is currently employed as a senior security manager for one of the top ten banks in the Washington, D.C, area. Dr. Baker is also an adjunct professor, teaching parttime for the University of Maryland University College in homeland security and for Southwestern College in security management.

Robert B. Batie, Jr., CISSP-ISSEP, ISSAP, ISSMP, CISM, CAP, has over 20 years of experience in communication security and information assurance. He is a senior principal systems engineer at Raytheon NCS, in St. Petersburg, FL. He is a Raytheon Author, Inventor and Technical Honoree, as well as a contributing author for the Official Guide to the CISSP-ISSEP CBK. He has published articles in the CSI Journal, Alert Newsletter and presented at Raytheon symposiums, the CSI Conferences, and the International Biometric Conference. He is an active member of (ISC)2.

Bob has a Master’s of Science in Computer Systems Management from the University of Maryland and is currently working on a Ph.D. at Nova Southeastern University.

Gilbert Held graduated from Pennsylvania Military College with a B.S. in electrical engineering; he also has earned an MSEE degree from New York University and an MSTM and M.B.A. from The American University. He spent 27 years in the U.S. Army and retired as a Lieutenant Colonel. Gil was the Chief of Data Communications for the U.S. Post Office of Personal Management for 20 years. He also designed, acquired, and constructed the OPM’s Web presence and received the Directors Award for his efforts.

Gil has written over 100 technical books that have exceeded over a million copies, over 500 technical articles on personal computing and data communications and business, and taught 14 different graduate level courses. He has also served as the Editor-in-Chief of the Wiley International journal of Network Management and was selected by the Vice President of the United States to represent the United States at the Jerusalem Conference on Information Technology.

Mark J. Makowski, CISSP-ISSAP, is a security architect who has worked in IT for more than 29 years. A graduate of Lawrence Technological University, Mark began his career as a field engineer at Burrough’s Corporation in the early 1980s. In the mid-1990s, Mark began engineering tools to help secure UNIX servers for EDS customers. Since then, Mark has been responsible for developing security architectures across a broad range of technologies and industries. Currently, he is helping engineer enterprise services security offerings at a technology company operating in more than 170 countries around the globe. Mark, a member of the Motor City Chapter of ISSA, lives in the Detroit area.

Kelley Okolita is a Principal Consultant and Director of Business Continuity and Disaster Recovery for Hanover Insurance in Rhode Island. She built a new contingency program that cost less than industry peers. Within the first year she also renegotiated a hostile vendor contract saving the firm $500,000 a year and reducing the recovery timeline by 80% for time sensitive applications and added business recovery capabilities.

Kelley has also held key roles in Fidelity Investments as Director of Risk Management, where she was responsible for the recovery and business contingency efforts for roughly one third of the business operations and previously as Director of Corporate Contingency Planning. While in this role, Kelley spent 9 weeks in New Jersey supporting the recovery efforts of Fidelity New York operations from the events of September 11th.

She joined Fidelity in 1976 and has more than 20 years of experience in disaster recovery and business contingency planning both from a data center perspective and the business perspective. Through the years she has supported a number of business recoveries, both large and small. Kelley is an MBCP (Master Business Continuity Planner) and is a member of the Board of Directors for Disaster Recovery Institute International.

Sean M. Price, CISA, CISSP, is an independent security consultant and researcher living in northern Virginia. Over the last 15 years he has specialized in designing and evaluating organizational information assurance programs and system security architectures. His research interests include access control, insider threat, information flows, and applications of artificial intelligence to information assurance problems.

Sean’s prior publications include book chapters for the Information Security Management Handbook series and the Official (ISC) 2Guide to the CISSP CBK. A number of his articles and papers have appeared in peer-reviewed journals and conferences proceedings. Industry publications include the IEEE Computer Magazine, ISSA Journal, IA newsletter, and ISACA J-Online. You can reach him at sean.price@sentinel-consulting.com.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Détails sur le produit

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 11 commentaires
11 internautes sur 11 ont trouvé ce commentaire utile 
Very Well Done 13 février 2011
Par Akherat - Publié sur Amazon.com
Format: Relié Achat vérifié
Each of the domains is well written, and 5 of the 6 are covered in extensive detail that do a good job of providing all the information necessary for the exam, and then some. The section on business continuity is the only exception, being extremely short and lacking any real content. For being a domain of expertise and for such a critical aspect of information systems, BCP should have received significantly more detail. I took both the seminar and read the book prior to preparing for the test, which I successfully passed on my first attempt. I felt as though I gained more from the book than the seminar, although both were valuable. Where the seminar provides good perspective, the book provides better technical information. Both are important. For less experienced professionals, I would say try to do both prior to the exam. For seasoned pros, the book should be sufficient to pass the exam.
4 internautes sur 5 ont trouvé ce commentaire utile 
Could be so much better 20 août 2011
Par Hungry ForKnowledge - Publié sur Amazon.com
Format: Relié Achat vérifié
I am preparing for the CISSP-ISSAP, and I am finding this book to be such a dry / slow / boring read. As far as I can tell, the author is saying all the right things, but unfortunately does not back these up with any real-life examples.

Personally I find it hard to remember things that I cannot associate in my memory to a real-life event.

In contrast, I also took the ISC2 review course, and the instructor there provided a wealth of real life examples, anecdotes, and incidents, that made the concepts clearer and the course entertaining and memorable.

So as far as I am concerned, the author needs to re-write this book with a myriad of examples and in a manner that it will make it worthy of the price.

I have not taken the exam yet, so I will follow up with my impressions of how useful the book was for the exam.
1 internautes sur 1 ont trouvé ce commentaire utile 
Could be better 21 janvier 2012
Par G. Whitney - Publié sur Amazon.com
Format: Relié Achat vérifié
There is no flow to the book. Each chapter is written by a different author and the writing styles show. Each author also covers the materials at different depths. The cryptography chapter is well covered with material that is good to know but maybe not necessary for the ISSAP. BCP is short and light. I would like to have had more material in this section. There is a ton of material shoved into short chapters on access control and requirements. Overall, I say it's a decent read and it's fairly easy to get through. However, I don't think it appropriately covers the material for the exam or provides useful day to day working knowledge.

As for the sample questions, one of the questions in the book didn't have an answer in the Q&A section. I'm guessing it's the result of an editing error. Some of the Q&A provide good detail on why each answer is right and wrong while other chapters just give you the answer. The Q&A section did not match my experience of the actual exam. The questions in the book are much easier. For the price, I expected a higher quality product.
1 internautes sur 1 ont trouvé ce commentaire utile 
Long tedious read but the only one you can trust for the CISSP-ISSAP 25 juin 2013
Par Mervyn Perry - Publié sur Amazon.com
Format: Relié Achat vérifié
It is a very in depth book, and a very tedious one to read but the only one you can trust for the CISSP-ISSAP as it is written and approved by (ISC)2

Good reference book, not a great ISSAP test prep guide 24 octobre 2012
Par Adam Ellis - Publié sur Amazon.com
Format: Relié Achat vérifié
I purchased this book along with "Security Engineering: A Guide to Building Dependable Distributed Systems" to study for the CISSP-ISSAP concentration. My biggest concern with this as a test prep guide was that it did not sufficiently cover all of the topics that I was quizzed on when I sat for the exam. This book was light on providing insight (at least to the level the test was expecting) for many of today's hot topics - including 'cloud security,' 'virtualization,' and 'big data.' If you do decide to use this for test prep, please consider supplementing with the Security Engineering book mentioned above at a minimum.

For background, I'm a 10 year information security professional with considerable experience in user access controls design, engineering, and implementation. I did pass the ISSAP concentration on my first attempt.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?