Official (ISC)2? Guide to the ISSAP? CBK et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus


ou
Identifiez-vous pour activer la commande 1-Click.
Amazon Rachète votre article
Recevez un chèque-cadeau de EUR 10,69
Amazon Rachète cet article
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Commencez à lire Official (ISC)2? Guide to the ISSAP? CBK sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Official (ISC)2® Guide to the ISSAP® CBK [Anglais] [Relié]

ISC)² Corporate

Prix : EUR 74,59 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Il ne reste plus que 3 exemplaire(s) en stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 42,28  
Relié EUR 74,59  
Vendez cet article - Prix de rachat jusqu'à EUR 10,69
Vendez Official (ISC)2® Guide to the ISSAP® CBK contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 10,69, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.
Il y a une édition plus récente de cet article:
Official (ISC)2® Guide to the ISSAP® CBK, Second Edition Official (ISC)2® Guide to the ISSAP® CBK, Second Edition
EUR 66,27
En stock.

Offres spéciales et liens associés


Les clients ayant acheté cet article ont également acheté


Descriptions du produit

Présentation de l'éditeur

Candidates for the CISSP-ISSAP® professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP® CBK®, but also the ability to apply this in-depth knowledge to develop a detailed security architecture that meets all requirements.

Supplying an authoritative review of the key concepts and requirements of the ISSAP® CBK®, the Official (ISC) Guide to the ISSAP® CBK® provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Requirements Analysis, Access Control, Cryptography, Physical Security, BCP/DRP, and Telecommunications and Network Security.

  • Endorsed by the (ISC)
  • Follows the newly revised CISSP-ISSAP® CBK®
  • Reflects the evolving terminology and changing requirements for security professionals

With chapters written by those shaping this relatively new and rapidly developing field, this book is the only officially endorsed guide to the CISSP-ISSAP® CBK®. Read it, study it, and refer to it often as it will help improve your chances of achieving certification the first time around. Following certification it will serve as an authoritative reference for constructing architectures that are compliant with the latest security requirements.

Biographie de l'auteur

About the Authors:

Alex Golod, CISSP, is a senior security consultant with 29 years of experience for one of the Fortune 100 IT firms. He has focused the last 12 years of his career in information security. Alex’s many responsibilities include architecture, engineering, and operations of security solutions. His broad area of expertise  covers application, network and data security, as well as risk analysis and mitigation.

Paul Baker, CPP, is a security manager with more than 30 years of extensive experience in all phases of law enforcement and industrial security. He holds a Doctorate in Strategic Leadership from Regent University, along with a Master of Science in Criminal Justice from Troy University, and is a Certified Protection Professional (CPP). Dr. Baker spent 6 years in the U.S. Marine Corps and has retired from the Maryland State Police. Dr. Baker is currently employed as a senior security manager for one of the top ten banks in the Washington, D.C, area. Dr. Baker is also an adjunct professor, teaching parttime for the University of Maryland University College in homeland security and for Southwestern College in security management.

Robert B. Batie, Jr., CISSP-ISSEP, ISSAP, ISSMP, CISM, CAP, has over 20 years of experience in communication security and information assurance. He is a senior principal systems engineer at Raytheon NCS, in St. Petersburg, FL. He is a Raytheon Author, Inventor and Technical Honoree, as well as a contributing author for the Official Guide to the CISSP-ISSEP CBK. He has published articles in the CSI Journal, Alert Newsletter and presented at Raytheon symposiums, the CSI Conferences, and the International Biometric Conference. He is an active member of (ISC)2.

Bob has a Master’s of Science in Computer Systems Management from the University of Maryland and is currently working on a Ph.D. at Nova Southeastern University.

Gilbert Held graduated from Pennsylvania Military College with a B.S. in electrical engineering; he also has earned an MSEE degree from New York University and an MSTM and M.B.A. from The American University. He spent 27 years in the U.S. Army and retired as a Lieutenant Colonel. Gil was the Chief of Data Communications for the U.S. Post Office of Personal Management for 20 years. He also designed, acquired, and constructed the OPM’s Web presence and received the Directors Award for his efforts.

Gil has written over 100 technical books that have exceeded over a million copies, over 500 technical articles on personal computing and data communications and business, and taught 14 different graduate level courses. He has also served as the Editor-in-Chief of the Wiley International journal of Network Management and was selected by the Vice President of the United States to represent the United States at the Jerusalem Conference on Information Technology.

Mark J. Makowski, CISSP-ISSAP, is a security architect who has worked in IT for more than 29 years. A graduate of Lawrence Technological University, Mark began his career as a field engineer at Burrough’s Corporation in the early 1980s. In the mid-1990s, Mark began engineering tools to help secure UNIX servers for EDS customers. Since then, Mark has been responsible for developing security architectures across a broad range of technologies and industries. Currently, he is helping engineer enterprise services security offerings at a technology company operating in more than 170 countries around the globe. Mark, a member of the Motor City Chapter of ISSA, lives in the Detroit area.

Kelley Okolita is a Principal Consultant and Director of Business Continuity and Disaster Recovery for Hanover Insurance in Rhode Island. She built a new contingency program that cost less than industry peers. Within the first year she also renegotiated a hostile vendor contract saving the firm $500,000 a year and reducing the recovery timeline by 80% for time sensitive applications and added business recovery capabilities.

Kelley has also held key roles in Fidelity Investments as Director of Risk Management, where she was responsible for the recovery and business contingency efforts for roughly one third of the business operations and previously as Director of Corporate Contingency Planning. While in this role, Kelley spent 9 weeks in New Jersey supporting the recovery efforts of Fidelity New York operations from the events of September 11th.

She joined Fidelity in 1976 and has more than 20 years of experience in disaster recovery and business contingency planning both from a data center perspective and the business perspective. Through the years she has supported a number of business recoveries, both large and small. Kelley is an MBCP (Master Business Continuity Planner) and is a member of the Board of Directors for Disaster Recovery Institute International.

Sean M. Price, CISA, CISSP, is an independent security consultant and researcher living in northern Virginia. Over the last 15 years he has specialized in designing and evaluating organizational information assurance programs and system security architectures. His research interests include access control, insider threat, information flows, and applications of artificial intelligence to information assurance problems.

Sean’s prior publications include book chapters for the Information Security Management Handbook series and the Official (ISC) 2Guide to the CISSP CBK. A number of his articles and papers have appeared in peer-reviewed journals and conferences proceedings. Industry publications include the IEEE Computer Magazine, ISSA Journal, IA newsletter, and ISACA J-Online. You can reach him at sean.price@sentinel-consulting.com.


Détails sur le produit


Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 3.2 étoiles sur 5  11 commentaires
11 internautes sur 11 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Very Well Done 13 février 2011
Par Akherat - Publié sur Amazon.com
Format:Relié|Achat vérifié
Each of the domains is well written, and 5 of the 6 are covered in extensive detail that do a good job of providing all the information necessary for the exam, and then some. The section on business continuity is the only exception, being extremely short and lacking any real content. For being a domain of expertise and for such a critical aspect of information systems, BCP should have received significantly more detail. I took both the seminar and read the book prior to preparing for the test, which I successfully passed on my first attempt. I felt as though I gained more from the book than the seminar, although both were valuable. Where the seminar provides good perspective, the book provides better technical information. Both are important. For less experienced professionals, I would say try to do both prior to the exam. For seasoned pros, the book should be sufficient to pass the exam.
4 internautes sur 5 ont trouvé ce commentaire utile 
2.0 étoiles sur 5 Could be so much better 20 août 2011
Par Hungry ForKnowledge - Publié sur Amazon.com
Format:Relié|Achat vérifié
I am preparing for the CISSP-ISSAP, and I am finding this book to be such a dry / slow / boring read. As far as I can tell, the author is saying all the right things, but unfortunately does not back these up with any real-life examples.

Personally I find it hard to remember things that I cannot associate in my memory to a real-life event.

In contrast, I also took the ISC2 review course, and the instructor there provided a wealth of real life examples, anecdotes, and incidents, that made the concepts clearer and the course entertaining and memorable.

So as far as I am concerned, the author needs to re-write this book with a myriad of examples and in a manner that it will make it worthy of the price.

I have not taken the exam yet, so I will follow up with my impressions of how useful the book was for the exam.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Long tedious read but the only one you can trust for the CISSP-ISSAP 25 juin 2013
Par Mervyn Perry - Publié sur Amazon.com
Format:Relié|Achat vérifié
It is a very in depth book, and a very tedious one to read but the only one you can trust for the CISSP-ISSAP as it is written and approved by (ISC)2

Merv Perry MBA MSIS CISSP
1 internautes sur 1 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Could be better 21 janvier 2012
Par G. Whitney - Publié sur Amazon.com
Format:Relié|Achat vérifié
There is no flow to the book. Each chapter is written by a different author and the writing styles show. Each author also covers the materials at different depths. The cryptography chapter is well covered with material that is good to know but maybe not necessary for the ISSAP. BCP is short and light. I would like to have had more material in this section. There is a ton of material shoved into short chapters on access control and requirements. Overall, I say it's a decent read and it's fairly easy to get through. However, I don't think it appropriately covers the material for the exam or provides useful day to day working knowledge.

As for the sample questions, one of the questions in the book didn't have an answer in the Q&A section. I'm guessing it's the result of an editing error. Some of the Q&A provide good detail on why each answer is right and wrong while other chapters just give you the answer. The Q&A section did not match my experience of the actual exam. The questions in the book are much easier. For the price, I expected a higher quality product.
1.0 étoiles sur 5 Not such a good price for an outdated edition 2 juin 2014
Par James M. Anderson - Publié sur Amazon.com
Format:Relié|Achat vérifié
Uhhh, thanks Amazon for not mentioning that a 2nd Edition had come out or showing it in your results. Since I actually want to pass the certification exam, guess I'll have to buy 2nd Edition now...
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?