MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Secured computing / Carl F. Endorf.

By: Endorf, Carl F, 1969-.
Material type: materialTypeLabelBookPublisher: Victoria, British Columbia : Trafford Publ., 2002Edition: 2nd ed.Description: iv, 538 p. : ill. (some col.) ; 28 cm. + pbk.ISBN: 155212889X.Other title: Secured computing : CISSP study guide [Cover title].Subject(s): Computer networks -- Examinations -- Study guidesDDC classification: 005.8
Contents:
Domain 1 - Access Control Systems & Methodology -- Domain 2 - Telecommunications & Network Security -- Domain 3 - Security Management Practices -- Domain 4 - Applications & Systems Development -- Domain 5 - Cryptography -- Domain 6 - Security Architecture and Models -- Domain 7 - Operations Security -- Domain 8 - Business Continuity & Disaster Recovery Planning -- Domain 9 - Laws, Investigations and Ethics -- Domain 10 - Physical Security -- Methods of Attack.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00092537
Total holds: 0

Enhanced descriptions from Syndetics:

The Certified Information Systems Security Professional (CISSP) designation is the most respected certification an IT professional can obtain during their career. It demonstrates the ability to understand a broad range of security issues in many areas.

This is the ultimate study guide for the Certified Information Security Systems Professional CISSP Exam. You pass or your money back! * It is designed for the experienced Security Professional. This guide will help to supplement your studies and further your goal of acquiring the CISSP designation. The book is designed for a security professional by a security professional. The author has strived to take the information that is needed to be successful in the security arena and to condense it into one concise volume.

In addition, this book is also a great resource for anyone interested in getting a better handle on how to secure ones organization and enterprise. This guide will help you to understand the common body of knowledge that is set forth by ISC2* and many security professionals today.

* CISSP is a registered Trademark of ISC2, Inc. This publication is not endorsed nor sponsered by ISC2, Inc. The information here within is that of the authors and his intent to consolidate this information. The test and quiz questions are not official test questions set forth by ISC2, but intended only for the purpose of learning the knowledge needed to prepare for this test.

Includes bibliographical references (page 229) and index.

Domain 1 - Access Control Systems & Methodology -- Domain 2 - Telecommunications & Network Security -- Domain 3 - Security Management Practices -- Domain 4 - Applications & Systems Development -- Domain 5 - Cryptography -- Domain 6 - Security Architecture and Models -- Domain 7 - Operations Security -- Domain 8 - Business Continuity & Disaster Recovery Planning -- Domain 9 - Laws, Investigations and Ethics -- Domain 10 - Physical Security -- Methods of Attack.

Powered by Koha