Amazon cover image
Image from Amazon.com

Official (ISC)2ʼ Guide to the ISSAPʼ CBK [Book] / edited by Harold F. Tipton.

Contributor(s): Material type: TextTextSeries: (ISC)2 press series | (ISC)² press seriesPublication details: Boca Raton : CRC press : Auerbach Publications, 2011.Description: xv, 505 p. : ill. ; 24 cmISBN:
  • 9781439800935 (hardcover : alk. paper)
Subject(s): DDC classification:
  • 004 22
Other classification:
  • 004
Summary: Candidates for the CISSP-ISSAPʼ professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAPʼ CBKʼ, but also the ability to apply this in-depth knowledge to develop a detailed security architecture that meets all requirements. Supplying an authoritative review of the key concepts and requirements of the ISSAPʼ CBKʼ, the Official (ISC)2ʼ Guide to the ISSAPʼ CBKʼ provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Requirements Analysis, Access Control, Cryptography, Physical Security, BCP/DRP, and Telecommunications and Network Security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Candidates for the CISSP-ISSAPʼ professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAPʼ CBKʼ, but also the ability to apply this in-depth knowledge to develop a detailed security architecture that meets all requirements. Supplying an authoritative review of the key concepts and requirements of the ISSAPʼ CBKʼ, the Official (ISC)2ʼ Guide to the ISSAPʼ CBKʼ provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Requirements Analysis, Access Control, Cryptography, Physical Security, BCP/DRP, and Telecommunications and Network Security.

There are no comments on this title.

to post a comment.