Commencez à lire Official (ISC)2® Guide to the ISSMP® CBK® sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Official (ISC)2® Guide to the ISSMP® CBK®
 
Agrandissez cette image
 

Official (ISC)2® Guide to the ISSMP® CBK® [Format Kindle]

Corporate , (Isc)² , Harold F. Tipton
5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)

Prix conseillé : EUR 67,34 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 74,45
Prix Kindle : EUR 47,14 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 27,31 (37%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 47,14  
Relié EUR 67,80  




Les clients ayant acheté cet article ont également acheté


Descriptions du produit

Présentation de l'éditeur

As the recognized leader in the field of information security education and certification, the (ISC) 2® promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP ® ) examination assesses individuals’ understanding of security management practices. Obtaining certification validates your ability to create and implement effective information security management programs that meet the security needs of today’s organizations. Preparing professionals for certification and job readiness, the Official (ISC) 2® Guide to the ISSMP ® CBK ® supplies a complete overview of the management topics related to information security. It provides for an expanded enterprise model of security and management that delves into project management, risk management, and continuity planning. Facilitating the mastery of the five ISSEP domains required for certification, the book includes authoritative coverage of enterprise security management, enterprise-wide system development, compliance of operations security, business continuity planning, disaster recovery planning, as well as legal and ethical considerations. Presents a complete overview of the managerial elements related to information security Examines a larger enterprise model of security and management Provides an all-inclusive analysis of the five domains of the CISSP-ISSMP CBK—including sample questions for each domain Representing over a century of combined experience working at the forefront of information security, the editor and distinguished team of contributors provide unprecedented coverage of the things you need to know to achieve certification. This book will not only help you prepare for the CISSP-ISSMP certification exam, but also provide you with a solid foundation to enhance your career path—whether you’re a seasoned security veteran or just starting out.

Biographie de l'auteur

About the Editor:

Hal Tipton, currently an independent consultant, is a past president of the International Information System Security Certification Consortium and was a director of computer security for Rockwell International Corporation for about 15 years. He initiated the Rockwell computer and data security program in 1977 and then continued to administer, develop, enhance, and expand the program to accommodate the control needs produced by technological advances until his retirement from Rockwell in 1994.

Tipton has been a member of the Information Systems Security Association (ISSA) since 1982. He was the president of the Los Angeles chapter in 1984 and the president of the national organization of ISSA (1987–1989). He was added to the ISSA Hall of Fame and the ISSA Honor Role in 2000.

Tipton was a member of the National Institute for Standards and Technology (NIST), the Computer and Telecommunications Security Council, and the National Research Council Secure Systems Study Committee (for the National Academy of Sciences). He received his BS in engineering from the U.S. Naval Academy and his MA in personnel administration from George Washington University; he also received his certificate in computer science from the University of California at Irvine. He is a certified information system security professional (CISSP), ISSAP, and ISSMP.

He has been a speaker at all the major information security conferences including the following: Computer Security Institute, the ISSA Annual Working Conference, the Computer Security Workshop, MIS Conferences, AIS Security for Space Operations, DOE Computer Security Conference, National Computer Security Conference, IIA Security Conference, EDPAA, UCCEL Security & Audit Users Conference, and Industrial Security Awareness Conference.

He has conducted/participated in information security seminars for (ISC)2, Frost & Sullivan, UCI, CSULB, System Exchange Seminars, and the Institute for International Research. He participated in the Ernst & Young video "Protecting Information Assets." He is currently the editor of the Handbook of Information Security Management (Auerbach Publications). He chairs the (ISC)2 CBK Committees and the QA Committee. He received the Computer Security Institute’s Lifetime Achievement Award in 1994, the (ISC)2’s Hal Tipton Award in 2001, and the (ISC)2 Founders Award in 2009.

About the Contributors:

James Litchko, CISSP-ISSEP, CAP, MBCI, CMAS, Senior Security Expert, Litchko & Associates. Mr. Litchko has worked as a security and management expert for over 30 years. He has been an executive with five organizations and supervised and supported the securing of over 200 military, government, and commercial IT systems. Since 2008, he supported the securing of IT systems at DHS, DOE, VHA, NASA, EPA, USAF, DOJ, and FEMA. Jim created and taught the first graduate IT security course at Johns Hopkins University (JHU) and was a manager at NSA. Jim holds a masters degree from JHU and has authored five books on security and management topics.

Craig S. Wright, CISSP-ISSAP, ISSMP, is a director with Information Defense in Australia. He holds both the GSE-Malware and GSE-Compliance certifications from GIAC. He is a perpetual student with numerous postgraduate degrees including an LLM specializing in international commercial law and ecommerce law, a masters degree in mathematical statistics from Newcastle, and is working on his fourth IT-focused masters degree (in system development) at Charles Stuart University, Australia, where he lectures on subjects in digital forensics. He is writing his second doctorate on the quantification of information system risk at CSU.

Cheryl Hennell, EdD, MSc, CISSP, SBCI, has worked in the IT industry for 40 years. Her employment includes systems development for the Ministry of Defence, systems analysis for the Civil Service, European Consultancy for a blue chip organization, and 20 years as a senior university lecturer. She is currently head of IT and information assurance for Openreach, BT. She earned her master’s in information systems design from Kingston University, London, and her doctorate from the University of Southampton, UK, and is a specialist in the Business Continuity Institute, UK. She is also an ambassador for Childnet. Cheryl was the course director for the first digital forensics degree in the UK, which she created and delivered for the University of Portsmouth. She has been an invited speaker at international conferences in Europe, the Middle East, and Africa. Her subjects include information assurance, audit, risk and governance, physical security, and business continuity and disaster recovery.

Maura van der Linden spent over a decade in software testing at Microsoft Corporation with a specialization in security testing, including working in the Security Technology Unit on the Malware Response Team. After serving as a technical reviewer for MSDN Magazine, she wrote her first article on SQL injection testing for MSDN Magazine. She then wrote her first book, Testing Code Security, Auerbach, Boca Raton, FL, in order to teach other testers the need for and intricacy of security testing. Though now working as a programming writer, she maintains her close ties to the test and security communities.

Keith Willet, CISSP-ISSAP, has over 25 years experience in information technology spanning academia and commercial, local, and national governments. Mr. Willett has a BS in computer science from Towson University, Maryland, an MS in business from the University of Baltimore, Maryland, and an MSIA from Norwich University, Vermont, and he holds the CISSP and ISSAP designations from (ISC)2. Willett is the author of Information Assurance Architecture and coauthor of How to Achieve 27001 Certification, both published by Auerbach. When not working, Mr. Willet enjoys world travel, cuisine, and wine, and has enjoyed all in over 125 cities across 30 countries.

 


Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 3240 KB
  • Nombre de pages de l'édition imprimée : 468 pages
  • Editeur : Auerbach Publication; Édition : 1 (4 novembre 2011)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B005GL5422
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Activé
  • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)
  • Classement des meilleures ventes d'Amazon: n°158.714 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


Commentaires en ligne

4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoiles
0
5.0 étoiles sur 5
5.0 étoiles sur 5
Commentaires client les plus utiles
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Livraison en parfait état 12 juin 2013
Par gfel91
Format:Relié|Achat vérifié
Livre destiné aux managers en sécurité informatique disposant de la certification ISC2 CISSP
Et destiné à la révision de la 'concentration' ISSMP

Amazon a livré le livre rapidement, et le prix est compétitif

Le livre n'est pas trop grand, pour être transporté partout
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.0 étoiles sur 5  3 commentaires
5 internautes sur 5 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Passed the ISSMP just using this book 20 janvier 2013
Par Jeffrey R. Johnson - Publié sur Amazon.com
Format:Relié|Achat vérifié
Unlike the ISSEP ISC2 book the ISSMP one is relatively current. I started reading the book in October and took the exam in December - and thanks to the new testing format found out my result instantly. I think the ISSMP is a simpler exam than the ISSEP since it is somewhat more generic. I would say that the exam is somewhat of a crap shoot even after reading the book and I would suggest printing out material on some of the more substantial topics covered. Having put the time in to study and pass the exam I have to be honest and say I am not sure it really has benefited me getting an ISSMP - just being honest. Good luck.
3 internautes sur 3 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Book contents 8 mai 2013
Par Luis Gutierrez - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
I had received the 2011 Kindle edition a few months ago; but I recently learned that the domain names changed, and that new contents were added. It would be great to understand if the contents on the Kindle 2013 edition been updated from the 2011 edition to match such added contents and new domain names. It also would have been great to know that the CBK was about to be updated and that the 2011 edition was not up-to-date.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Well, I passed 5 mai 2014
Par Danny Redding - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
I read through the book once. Nothing groundbreaking. Nothing special. Nothing made me go "AH HA!". It's just a book about strategic security management. Flows nicely.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique