Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Certified Information Systems Security Professional (CISSP) Exam Guide
  • Table Of Contents Toc
Certified Information Systems Security Professional (CISSP) Exam Guide

Certified Information Systems Security Professional (CISSP) Exam Guide

By : Ted Jordan, Ric Daza, Hinne Hettema
5 (5)
close
close
Certified Information Systems Security Professional (CISSP) Exam Guide

Certified Information Systems Security Professional (CISSP) Exam Guide

5 (5)
By: Ted Jordan, Ric Daza, Hinne Hettema

Overview of this book

The (ISC)2 CISSP exam evaluates the competencies required to secure organizations, corporations, military sites, and government entities. The comprehensive CISSP certification guide offers up-to-date coverage of the latest exam syllabus, ensuring you can approach the exam with confidence, fully equipped to succeed. Complete with interactive flashcards, invaluable exam tips, and self-assessment questions, this CISSP book helps you build and test your knowledge of all eight CISSP domains. Detailed answers and explanations for all questions will enable you to gauge your current skill level and strengthen weak areas. This guide systematically takes you through all the information you need to not only pass the CISSP exam, but also excel in your role as a security professional. Starting with the big picture of what it takes to secure the organization through asset and risk management, it delves into the specifics of securing networks and identities. Later chapters address critical aspects of vendor security, physical security, and software security. By the end of this book, you'll have mastered everything you need to pass the latest CISSP certification exam and have this valuable desktop reference tool for ongoing security needs.
Table of Contents (28 chapters)
close
close

Computer Programming

Computer programming is the process of developing a set of instructions to direct a computer to perform a specific task such as updating an electronic address book or recording a video. These instructions (known as code) are written in a programming language that defines a syntax of instructions that the computer can understand. It is important to consider security during the writing of these instructions. Malicious, or even poorly written, code can introduce security flaws into a system. In this section, you will learn about the essential components of the development environment, which are programming languages, libraries, tool sets, integrated development environments (IDEs), and runtime, and their implications for security.

There are a multitude of programming languages available, including Python, Java, C/C++, JavaScript, and PHP. Libraries provide programmers with access to commonly used functionality such as access to a keyboard and screen. Toolsets assist...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Certified Information Systems Security Professional (CISSP) Exam Guide
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon