Showing posts with label cissp. Show all posts
Showing posts with label cissp. Show all posts

Official (ISC)2 Guide to the CISSP CBK ((ISC)2 Press) Review

Official (ISC)2 Guide to the CISSP CBK ((ISC)2 Press)
Average Reviews:

(More customer reviews)
Are you looking to buy Official (ISC)2 Guide to the CISSP CBK ((ISC)2 Press)? Here is the right place to find the great deals. we can offer discounts of up to 90% on Official (ISC)2 Guide to the CISSP CBK ((ISC)2 Press). Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Official (ISC)2 Guide to the CISSP CBK ((ISC)2 Press) ReviewI have read 4 books in my preparation for the CISSP. The All-in-One, Official CISSP CBK, CISSP Prep Guide, and the CISSP Exam Cram. This along with numerous study guides and several online courses. My overall comment is that I expected more from this book. It is extremely verbose and does not seem to "flow" like some of the other books. (Probably because it is written by numerous authors). The test questions at the end of each chapter are poorly written. It also seemed to lack some of the critical details I found in other books. The best overall guide I have found so far is the All-in-One (no big surprise). The official CISSP CBK did not provide any significant details you cannot find the All-in-one and it lacked details in several key areas.Official (ISC)2 Guide to the CISSP CBK ((ISC)2 Press) OverviewThe urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry's first and only CBK, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as the basis for (ISC)2's education and certification programs. Unique and exceptionally thorough, the Official (ISC)2 Guide to the CISSPCBKprovides a better understanding of the CISSP CBK - a collection of topics relevant to information security professionals around the world. Although the book still contains the ten domains of the CISSP, some of the domain titles have been revised to reflect evolving terminology and changing emphasis in the security professional's day-to-day environment. The ten domains include information security and risk management, access control, cryptography, physical (environmental) security, security architecture and design, business continuity (BCP) and disaster recovery planning (DRP), telecommunications and network security, application security, operations security, legal, regulations, and compliance and investigations. Endorsed by the (ISC)2, this valuable resource follows the newly revised CISSP CBK, providing reliable, current, and thorough information. Moreover, the Official (ISC)2 Guide to the CISSP CBK helps information security professionals gain awareness of the requirements of their profession and acquire knowledge validated by the CISSP certification.The book is packaged with a CD that is an invaluable tool for those seeking certification. It includes sample exams that simulate the actual exam, providing the same number and types of questions with the same allotment of time allowed. It even grades the exam, provides correct answers, and identifies areas where more study is needed.

Want to learn more information about Official (ISC)2 Guide to the CISSP CBK ((ISC)2 Press)?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition Review

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition
Average Reviews:

(More customer reviews)
Are you looking to buy The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition? Here is the right place to find the great deals. we can offer discounts of up to 90% on The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition ReviewI bought this book as a door prize, where Doug is speaking at our request to local security professional trade groups. Have not read it. It's current and relevant to our field, but ... expensive.The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition OverviewConducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguards. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessor left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition gives you detailed instruction on how to conduct a risk assessment effectively and efficiently. Supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting, this updated edition provides the tools needed to solicit and review the scope and rigor of risk assessment proposals with competence and confidence. Trusted to assess security for leading organizations and government agencies, including the CIA, NSA, and NATO, Douglas Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. He details time-tested methods to help you:Better negotiate the scope and rigor of security assessmentsEffectively interface with security assessment teamsGain an improved understanding of final report recommendationsDeliver insightful comments on draft reportsThe book includes charts, checklists, and sample reports to help you speed up the data gathering, analysis, and document development process. Walking you through the process of conducting an effective security assessment, it provides the tools and up-to-date understanding you need to select the security measures best suited to your organization.

Want to learn more information about The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...