CISSP CBK Suggested ReferencesURL: https://www.isc2.org/certifications/References • Access Control, Authentication, and Public Key Infrastructure Information Systems Security & Assurance
Trang 1CISSP CBK Suggested References
URL: https://www.isc2.org/certifications/References
• Access Control, Authentication, and Public Key Infrastructure (Information Systems Security
& Assurance) 1st Edition
by Bill Ballad, Tricia Ballad, Erin Banks Publisher: Jones & Bartlett Learning; 1 edition
(September 24, 2010) ISBN-13: 978-0763791285
• Applied Cryptography: Protocols, Algorithms, and Source Code in C
by Schneier, Bruce Publisher: John Wiley & Sons (November 1, 1995) ISBN-13:
978-0471117094
• Agile Development in the Real World 1st ed Edition
by Alan Cline Publisher: Apress; 1st ed edition (December 19, 2015) ISBN-13:
978-1484216781
• Building Secure Software: How to Avoid Security Problems the Right Way (paperback) (Addison-wesley Professional Computing Series) 1st Edition
by John Viega, Gary McGraw Publisher: Addison-Wesley Professional; 1 edition (October 4, 2001) ISBN-13: 978-0321774958
• Cloud Computing Bible 1st Edition
by Barrie Sosinsky Publisher: Wiley; 1 edition (January 11, 2011) ISBN-13: 978-0470903568
• Core Software Security: Security at the Source 1st Edition
by James Ransome, Anmol Misra Publisher: Auerbach Publications; 1 edition (December 9, 2013) ISBN-13: 978-1466560956
• Cryptography and Network Security: Principles and Practice (6th Edition) 6th Edition
by William Stallings Publisher: Pearson; 6 edition (March 16, 2013) ISBN-13: 978-0133354690
• Data Stewardship 1st Edition An Actionable Guide to Effective Data Management and Data Governance Write a review Authors: David Plotkin Paperback ISBN: 9780124103894 Imprint: Morgan Kaufmann Published Date: 26th September 2013
Trang 2• Designing Network Security, 2nd Edition
by Merike Kaeo Published Oct 30, 2003 by Cisco Press ISBN-13: 978-1-58705-117-3
• Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference 1st ed Edition
by Jamie Watters and Janet Watters Publisher: Apress; 1st ed edition (December 23, 2013) ISBN-13: 978-1430264064
• Disaster Recovery Planning: Preparing for the Unthinkable (3rd Edition) 3rd Edition
by Jon William Toigo Publisher: Prentice Hall; 3 edition (September 6, 2002) ISBN-13: 978-0130462824
• End-to-End Network Security: Defense-in-Depth 1st Edition
by Omar Santos Publisher: Cisco Press; 1 edition (September 3, 2007) ISBN-13:
978-1587053320
• Federated Identity Primer 1st Edition
by Derrick Rountree Publisher: Syngress; 1 edition (December 24, 2012) ISBN-13: 978-0124071896
• Handbook of Information Security, 3-Volume Set 1st Edition
by Hossein Bidgoli (Editor) Publisher: Wiley; 1 edition (December 30, 2005) ISBN-13: 978-0471648338
• Handbook of Information Security Management 98th Edition
by Harold F Tipton Publisher: Auerbach Publications; 98 edition (December 15, 1997) ISBN-13: 978-0849399473
• Identity and Access Management: Business Performance Through Connected Intelligence 1st Edition
by Ertem Osmanoglu Publisher: Syngress; 1 edition (December 10, 2013) ISBN-13: 978-0124081406
Trang 3• Identity Management: A Business Perspective
by Graham Williamson Publisher: Mc Press (February 20, 2017) ISBN-13: 978-1583474990
• Information Security Management Handbook, Fourth Edition, Volume II 1st Edition
by Harold F Tipton (Editor) Publisher: Auerbach Publications; 1 edition (October 20, 2000) ISBN-13: 978-0849308000
• Information Security Management Handbook, Volume 2 5th Edition
by Harold F Tipton (Editor), Micki Krause (Editor) Publisher: Auerbach Publications; 5 edition (December 28, 2004) ISBN-13: 978-0849332104
• Information Security Management Handbook, 6th Edition 6th Edition
by Harold F Tipton, Micki Krause Publisher: CRC Press; 6 edition (May 14, 2007) ISBN-13: 978-0849374951
• IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
by Naganand Doraswamy and Dan Harkins Publisher Prentice Hall Professional, 2003 ISBN 9780130461896
• (ISC)2 Code of Ethics
• ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
2013 ISO/IEC
• Java Web Services: Up and Running, 2nd Edition A Quick, Practical, and Thorough
Introduction
by Martin Kalin Publisher: O'Reilly Media; 2 edition (September 28, 2013) ISBN-13: 978-1449365110
• Kali Linux – Assuring Security
by Penetration Testing Kindle Edition by Lee Allen Tedi Heriyanto, Shakeel Ali Publisher: Packt Publishing (April 7, 2014)
Trang 4• Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals 1st Edition
by Constantine Photopoulos Publisher: Syngress; 1 edition (April 18, 2008) ISBN-13: 978-1597492393
• Network Security Assessment, 3rd Edition Know Your Network
by Chris McNab Publisher: O'Reilly Media Release Date: December 2016
• Network Security Assessment: From Vulnerability to Patch 1st Edition
by Steve Manzuik, Andre Gold, Chris Gatford Publisher: Syngress; 1 edition (November 7, 2006) ISBN-13: 978-1597491013
• NIST SP 800-37 Rev 1 Guide for Applying the Risk Management Framework to Federal Information Systems Feb 2010 (updated 2014) Joint Task Force
• NIST SP 800-41 Rev 1 Guidelines on Firewalls and Firewall Policy
by Karen Scarfone, Paul Hoffman September 2009
• NIST 800-64 Rev 2 Security Considerations in the System Development Life Cycle
by Richard Kissel, Kevin Stine, Matthew Scholl, Hart Rossman, Jim Fahlsing, Jessica Gulick October 2008
• NIST SP 800-100 Information Security Handbook: A Guide for Managers
by Pauline Bowen, Joan Hash, Mark Wilson Oct 2006
• NIST SP 800-115 Technical Guide to Information Security Testing and Assessment
by Karen Scarfone, Murugiah Souppaya, Amanda Cody, Angela Orebaugh September 2008
• NIST SP 800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
by Kelley Dempsey, Nirali Shah Chawla, Arnold Johnson, Ronald Johnston, Alicia Clay Jones, Angela Orebaugh, Matthew Scholl, Kevin Stine September 2011
Trang 5• Official (ISC)2 Guide to the CISSP CBK / Edition 2
by Steven Hernandez, CISSP Publisher: Auerbach Publications; 2 edition (December 22, 2009) ISBN-13: 9781439809594
• Official (ISC)2 Guide to the CISSP CBK, Fourth Edition ((ISC)2 Press) 4th Edition
by Adam Gordon (Editor) Publisher: Auerbach Publications; 4 edition (March 11, 2015) ISBN-13: 978-1482262759
• OWASP Application Security Verification Standard 3.0.1
July 2016 Lead author - Jim Manico
• Real Digital Forensics: Computer Security and Incident Response
by Keith J Jones, Richard Bejtlich, Curtis W Rose Publisher: Addison-Wesley Professional (October 3, 2005) ISBN-13: 978-0321240699
• Security in Computing [3rd Edition]
by Pfleeger, Charles P., Pfleeger, Shari Lawrence [Prentice Hall PTR,2002] ASIN: B00DU78E9O
• Security in Computing (5th Edition)
by Charles P Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies Publisher: Prentice Hall; 5 edition (February 5, 2015) ISBN-13: 978-0134085043
• Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training) 2nd Edition
by Sari Greene Publisher: Pearson IT Certification; 2 edition (March 29, 2014) ISBN-13: 978-0789751676
• Software Engineering New ed Edition
by Kassem A Saleh Publisher: J Ross Publishing; New ed edition (August 11, 2009) ISBN-13: 978-1932159943
• The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards 1st Edition
Trang 6by Courtney Bowman, Ari Gesher, John K Grant, Daniel Slate, and Elissa Lerner (Editor) Publisher: O'Reilly Media; 1 edition (September 11, 2015) ISBN-13: 978-1491904015
• The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics 1st Edition
by John Sammons Publisher: Syngress; 1 edition (March 9, 2012) ISBN-13: 978-1597496612
• The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress)) 1st Edition
by Stephen D Gantz Publisher: Syngress; 1 edition (December 6, 2013) ISBN-13:
978-0124171596
• The Complete Guide to Physical Security 1st Edition
by Paul R Baker and Daniel J Benny Publisher: Auerbach Publications; 1 edition (November
19, 2012) ISBN-13: 978-1420099638
• The InfoSec Handbook: An Introduction to Information Security 1st ed Edition
by Umesha Nayak and Umesh R Hodeghatta Publisher: Apress; 1st ed edition (August 30, 2014) ISBN-13: 978-1430263821
• Threat Modeling: Designing for Security 1st Edition
by Adam Shostack Publisher: Wiley; 1 edition (February 17, 2014) ISBN-13: 978-1118809990
• Using the Common Criteria for IT Security Evaluation
Debra S Herrmann December 27, 2002 by Auerbach Publications ISBN 9780849314049
• Wireless Security Merritt Maxim Publisher McGraw Hill Professional Apr 29, 2002 ISBN 9780072222869