1. Trang chủ
  2. » Tất cả

2018 CISSP CBK Suggested References

6 2 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 6
Dung lượng 19,3 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

CISSP CBK Suggested ReferencesURL: https://www.isc2.org/certifications/References • Access Control, Authentication, and Public Key Infrastructure Information Systems Security & Assurance

Trang 1

CISSP CBK Suggested References

URL: https://www.isc2.org/certifications/References

• Access Control, Authentication, and Public Key Infrastructure (Information Systems Security

& Assurance) 1st Edition

by Bill Ballad, Tricia Ballad, Erin Banks Publisher: Jones & Bartlett Learning; 1 edition

(September 24, 2010) ISBN-13: 978-0763791285

• Applied Cryptography: Protocols, Algorithms, and Source Code in C

by Schneier, Bruce Publisher: John Wiley & Sons (November 1, 1995) ISBN-13:

978-0471117094

• Agile Development in the Real World 1st ed Edition

by Alan Cline Publisher: Apress; 1st ed edition (December 19, 2015) ISBN-13:

978-1484216781

• Building Secure Software: How to Avoid Security Problems the Right Way (paperback) (Addison-wesley Professional Computing Series) 1st Edition

by John Viega, Gary McGraw Publisher: Addison-Wesley Professional; 1 edition (October 4, 2001) ISBN-13: 978-0321774958

• Cloud Computing Bible 1st Edition

by Barrie Sosinsky Publisher: Wiley; 1 edition (January 11, 2011) ISBN-13: 978-0470903568

• Core Software Security: Security at the Source 1st Edition

by James Ransome, Anmol Misra Publisher: Auerbach Publications; 1 edition (December 9, 2013) ISBN-13: 978-1466560956

• Cryptography and Network Security: Principles and Practice (6th Edition) 6th Edition

by William Stallings Publisher: Pearson; 6 edition (March 16, 2013) ISBN-13: 978-0133354690

• Data Stewardship 1st Edition An Actionable Guide to Effective Data Management and Data Governance Write a review Authors: David Plotkin Paperback ISBN: 9780124103894 Imprint: Morgan Kaufmann Published Date: 26th September 2013

Trang 2

• Designing Network Security, 2nd Edition

by Merike Kaeo Published Oct 30, 2003 by Cisco Press ISBN-13: 978-1-58705-117-3

• Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference 1st ed Edition

by Jamie Watters and Janet Watters Publisher: Apress; 1st ed edition (December 23, 2013) ISBN-13: 978-1430264064

• Disaster Recovery Planning: Preparing for the Unthinkable (3rd Edition) 3rd Edition

by Jon William Toigo Publisher: Prentice Hall; 3 edition (September 6, 2002) ISBN-13: 978-0130462824

• End-to-End Network Security: Defense-in-Depth 1st Edition

by Omar Santos Publisher: Cisco Press; 1 edition (September 3, 2007) ISBN-13:

978-1587053320

• Federated Identity Primer 1st Edition

by Derrick Rountree Publisher: Syngress; 1 edition (December 24, 2012) ISBN-13: 978-0124071896

• Handbook of Information Security, 3-Volume Set 1st Edition

by Hossein Bidgoli (Editor) Publisher: Wiley; 1 edition (December 30, 2005) ISBN-13: 978-0471648338

• Handbook of Information Security Management 98th Edition

by Harold F Tipton Publisher: Auerbach Publications; 98 edition (December 15, 1997) ISBN-13: 978-0849399473

• Identity and Access Management: Business Performance Through Connected Intelligence 1st Edition

by Ertem Osmanoglu Publisher: Syngress; 1 edition (December 10, 2013) ISBN-13: 978-0124081406

Trang 3

• Identity Management: A Business Perspective

by Graham Williamson Publisher: Mc Press (February 20, 2017) ISBN-13: 978-1583474990

• Information Security Management Handbook, Fourth Edition, Volume II 1st Edition

by Harold F Tipton (Editor) Publisher: Auerbach Publications; 1 edition (October 20, 2000) ISBN-13: 978-0849308000

• Information Security Management Handbook, Volume 2 5th Edition

by Harold F Tipton (Editor), Micki Krause (Editor) Publisher: Auerbach Publications; 5 edition (December 28, 2004) ISBN-13: 978-0849332104

• Information Security Management Handbook, 6th Edition 6th Edition

by Harold F Tipton, Micki Krause Publisher: CRC Press; 6 edition (May 14, 2007) ISBN-13: 978-0849374951

• IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks

by Naganand Doraswamy and Dan Harkins Publisher Prentice Hall Professional, 2003 ISBN 9780130461896

• (ISC)2 Code of Ethics

• ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements

2013 ISO/IEC

• Java Web Services: Up and Running, 2nd Edition A Quick, Practical, and Thorough

Introduction

by Martin Kalin Publisher: O'Reilly Media; 2 edition (September 28, 2013) ISBN-13: 978-1449365110

• Kali Linux – Assuring Security

by Penetration Testing Kindle Edition by Lee Allen Tedi Heriyanto, Shakeel Ali Publisher: Packt Publishing (April 7, 2014)

Trang 4

• Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals 1st Edition

by Constantine Photopoulos Publisher: Syngress; 1 edition (April 18, 2008) ISBN-13: 978-1597492393

• Network Security Assessment, 3rd Edition Know Your Network

by Chris McNab Publisher: O'Reilly Media Release Date: December 2016

• Network Security Assessment: From Vulnerability to Patch 1st Edition

by Steve Manzuik, Andre Gold, Chris Gatford Publisher: Syngress; 1 edition (November 7, 2006) ISBN-13: 978-1597491013

• NIST SP 800-37 Rev 1 Guide for Applying the Risk Management Framework to Federal Information Systems Feb 2010 (updated 2014) Joint Task Force

• NIST SP 800-41 Rev 1 Guidelines on Firewalls and Firewall Policy

by Karen Scarfone, Paul Hoffman September 2009

• NIST 800-64 Rev 2 Security Considerations in the System Development Life Cycle

by Richard Kissel, Kevin Stine, Matthew Scholl, Hart Rossman, Jim Fahlsing, Jessica Gulick October 2008

• NIST SP 800-100 Information Security Handbook: A Guide for Managers

by Pauline Bowen, Joan Hash, Mark Wilson Oct 2006

• NIST SP 800-115 Technical Guide to Information Security Testing and Assessment

by Karen Scarfone, Murugiah Souppaya, Amanda Cody, Angela Orebaugh September 2008

• NIST SP 800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

by Kelley Dempsey, Nirali Shah Chawla, Arnold Johnson, Ronald Johnston, Alicia Clay Jones, Angela Orebaugh, Matthew Scholl, Kevin Stine September 2011

Trang 5

• Official (ISC)2 Guide to the CISSP CBK / Edition 2

by Steven Hernandez, CISSP Publisher: Auerbach Publications; 2 edition (December 22, 2009) ISBN-13: 9781439809594

• Official (ISC)2 Guide to the CISSP CBK, Fourth Edition ((ISC)2 Press) 4th Edition

by Adam Gordon (Editor) Publisher: Auerbach Publications; 4 edition (March 11, 2015) ISBN-13: 978-1482262759

• OWASP Application Security Verification Standard 3.0.1

July 2016 Lead author - Jim Manico

• Real Digital Forensics: Computer Security and Incident Response

by Keith J Jones, Richard Bejtlich, Curtis W Rose Publisher: Addison-Wesley Professional (October 3, 2005) ISBN-13: 978-0321240699

• Security in Computing [3rd Edition]

by Pfleeger, Charles P., Pfleeger, Shari Lawrence [Prentice Hall PTR,2002] ASIN: B00DU78E9O

• Security in Computing (5th Edition)

by Charles P Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies Publisher: Prentice Hall; 5 edition (February 5, 2015) ISBN-13: 978-0134085043

• Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training) 2nd Edition

by Sari Greene Publisher: Pearson IT Certification; 2 edition (March 29, 2014) ISBN-13: 978-0789751676

• Software Engineering New ed Edition

by Kassem A Saleh Publisher: J Ross Publishing; New ed edition (August 11, 2009) ISBN-13: 978-1932159943

• The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards 1st Edition

Trang 6

by Courtney Bowman, Ari Gesher, John K Grant, Daniel Slate, and Elissa Lerner (Editor) Publisher: O'Reilly Media; 1 edition (September 11, 2015) ISBN-13: 978-1491904015

• The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics 1st Edition

by John Sammons Publisher: Syngress; 1 edition (March 9, 2012) ISBN-13: 978-1597496612

• The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress)) 1st Edition

by Stephen D Gantz Publisher: Syngress; 1 edition (December 6, 2013) ISBN-13:

978-0124171596

• The Complete Guide to Physical Security 1st Edition

by Paul R Baker and Daniel J Benny Publisher: Auerbach Publications; 1 edition (November

19, 2012) ISBN-13: 978-1420099638

• The InfoSec Handbook: An Introduction to Information Security 1st ed Edition

by Umesha Nayak and Umesh R Hodeghatta Publisher: Apress; 1st ed edition (August 30, 2014) ISBN-13: 978-1430263821

• Threat Modeling: Designing for Security 1st Edition

by Adam Shostack Publisher: Wiley; 1 edition (February 17, 2014) ISBN-13: 978-1118809990

• Using the Common Criteria for IT Security Evaluation

Debra S Herrmann December 27, 2002 by Auerbach Publications ISBN 9780849314049

• Wireless Security Merritt Maxim Publisher McGraw Hill Professional Apr 29, 2002 ISBN 9780072222869

Ngày đăng: 10/11/2020, 10:25

w