Official ISC 2 Guide to the CSSLP

Author: Mano Paul
Publisher: CRC Press
ISBN: 9781439826065
Release Date: 2016-04-19
Genre: Business & Economics

As the global leader in information security education and certification, (ISC)2® has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP®) is a testament to the organization’s ongoing commitment to information and software security. The Official (ISC)2® Guide to the CSSLP® provides an all-inclusive analysis of the CSSLP Common Body of Knowledge (CBK®). As the first comprehensive guide to the CSSLP CBK, it facilitates the required understanding of the seven CSSLP domains—Secure Software Concepts, Secure Software Requirements, Secure Software Design, Secure Software Implementation/Coding, Secure Software Testing, Software Acceptance, and Software Deployment, Operations, Maintenance and Disposal—to assist candidates for certification and beyond. Serves as the only official guide to the CSSLP professional certification Details the software security activities that need to be incorporated throughout the software development lifecycle Provides comprehensive coverage that includes the people, processes, and technology components of software, networks, and host defenses Supplies a pragmatic approach to implementing software assurances in the real-world The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP examination, this book is also an indispensable software security reference for those already part of the certified elite. A robust and comprehensive appendix makes this book a time-saving resource for anyone involved in secure software development.

Official ISC 2 Guide to the CAP CBK Second Edition

Author: Patrick D. Howard
Publisher: CRC Press
ISBN: 9781439820759
Release Date: 2012-07-18
Genre: Computers

Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP®) Common Body of Knowledge (CBK®) and NIST SP 800-37, the Official (ISC)2® Guide to the CAP® CBK®, Second Edition provides readers with the tools to effectively secure their IT systems via standard, repeatable processes. Derived from the author’s decades of experience, including time as the CISO for the Nuclear Regulatory Commission, the Department of Housing and Urban Development, and the National Science Foundation’s Antarctic Support Contract, the book describes what it takes to build a system security authorization program at the organizational level in both public and private organizations. It analyzes the full range of system security authorization (formerly C&A) processes and explains how they interrelate. Outlining a user-friendly approach for top-down implementation of IT security, the book: Details an approach that simplifies the authorization process, yet still satisfies current federal government criteria Explains how to combine disparate processes into a unified risk management methodology Covers all the topics included in the Certified Authorization Professional (CAP®) Common Body of Knowledge (CBK®) Examines U.S. federal polices, including DITSCAP, NIACAP, CNSS, NIAP, DoD 8500.1 and 8500.2, and NIST FIPS Reviews the tasks involved in certifying and accrediting U.S. government information systems Chapters 1 through 7 describe each of the domains of the (ISC)2® CAP® CBK®. This is followed by a case study on the establishment of a successful system authorization program in a major U.S. government department. The final chapter considers the future of system authorization. The book’s appendices include a collection of helpful samples and additional information to provide you with the tools to effectively secure your IT systems.

Official ISC 2 Guide to the SSCP CBK Second Edition

Author: Harold F. Tipton
Publisher: CRC Press
ISBN: 1439804842
Release Date: 2016-04-19
Genre: Computers

The (ISC)2® Systems Security Certified Practitioner (SSCP®) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK® has quickly become the book that many of today’s security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)2 CBK. Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text: Presents widely recognized best practices and techniques used by the world's most experienced administrators Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)2 certification Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.

Roadmap to Information Security For IT and Infosec Managers

Author: Michael E. Whitman
Publisher: Cengage Learning
ISBN: 9781285225029
Release Date: 2012-08-01
Genre: Computers

ROADMAP TO INFORMATION SECURITY: FOR IT AND INFOSEC MANAGERS provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on assessing and improving an organization's security. The content helps IT managers to handle an assignment to an information security role in ways that conform to expectations and requirements, while supporting the goals of the manager in building and maintaining a solid information security program. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Secrets lies

Author: Bruce Schneier
Publisher:
ISBN: 3898643026
Release Date: 2004
Genre:

Willkommen in der New Economy, der Welt der digitalen Wirtschaft. Informationen sind leichter zugänglich als je zuvor. Die Vernetzung wird dicher, und digitale Kommunikation ist aus den Unternehmen nicht mehr wegzudenken. Die Begeisterung für die Technologie hat jedoch Ihren Preis: Die Zahl der Sicherheitsrisiken nimmt ständig zu. Die neuen Gefahren, die mit dem E-Business verknüpft sind, müssen den Unternehmen weltweit aber erst klar werden. Dieses Buch ist ein erster Schritt in diese Richtung. Bruce Schneier, anerkannter Experte im Bereich Kryptographie, erklärt, was Unternehmen über IT-Sicherheit wissen müssen, um zu überleben und wettbewerbsfähig zu bleiben. Er deckt das gesamte System auf, von den Ursachen der Sicherheitslücken bis hin zu den Motiven, die hinter böswilligen Attacken stehen. Schneier zeigt Sicherheitstechnologien und deren Möglichkeiten, aber auch deren Grenzen auf. Fundiert und anschaulich zugleich behandelt dieser praktische Leitfaden: - Die digitalen Bedrohungen und Angriffe, die es zu kennen gilt - Die derzeit verfügbaren Sicherheitsprodukte und -prozesse - Die Technologien, die in den nächsten Jahren interessant werden könnten - Die Grenzen der Technik - Das Vorgehen, um Sicherheitsmängel an einem Produkt offenzulegen - Die Möglichkeiten, existierende Risiken in einem Unternehmen festzustellen - Die Implementierung einer wirksamen Sicherheitspolitik Schneiers Darstellung der digitalen Welt und unserer vernetzten Gesellschaft ist pragmatisch, interessant und humorvoll. Und sie ermöglicht es dem Leser, die vernetzte Welt zu verstehen und sich gegen ihre Bedrohungen zu wappnen. Hier finden Sie die Unterstützung eines Experten, die Sie für die Entscheidungsfindung im Bereich IT-Sicherheit brauchen.

Hacken f r Dummies

Author: Kevin Beaver
Publisher: John Wiley & Sons
ISBN: 9783527708307
Release Date: 2013
Genre:

Der einzige Weg, den eigenen Computer vor Hack-Angriffen zu schützen, ist zu wissen, wie Hacker arbeiten. Betrachten Sie Ihren Computer oder Ihr Computersystem vom Standpunkt eines Hackers und lernen Sie, wie Sie sich vor Angriffen schützen können. Sie werden verstehen lernen, wie Hacker Passwörter knacken, wie Netzwerke funktionieren und welche Schwachstellen sie haben, wie die Betriebssysteme Windows, Linux und NetWare angreifbar sind und wie Datenbanken ausspioniert werden können. Der Autor zeigt Ihnen, wie Sie Ihre Systeme auf Schwachstellen überprüfen und Sicherheitslücken ausbessern können. Machen Sie sich die Tricks der Hacker zu eigen und drehen Sie den Spieß um.

Official ISC 2 Guide to the CISSP CBK

Author: Steven Hernandez, CISSP
Publisher: CRC Press
ISBN: 1439863172
Release Date: 2016-04-19
Genre: Computers

The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry’s first and only CBK®, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as the basis for (ISC)2’s education and certification programs. Unique and exceptionally thorough, the Official (ISC)2® Guide to the CISSP®CBK®provides a better understanding of the CISSP CBK — a collection of topics relevant to information security professionals around the world. Although the book still contains the ten domains of the CISSP, some of the domain titles have been revised to reflect evolving terminology and changing emphasis in the security professional’s day-to-day environment. The ten domains include information security and risk management, access control, cryptography, physical (environmental) security, security architecture and design, business continuity (BCP) and disaster recovery planning (DRP), telecommunications and network security, application security, operations security, legal, regulations, and compliance and investigations. Endorsed by the (ISC)2, this valuable resource follows the newly revised CISSP CBK, providing reliable, current, and thorough information. Moreover, the Official (ISC)2® Guide to the CISSP® CBK® helps information security professionals gain awareness of the requirements of their profession and acquire knowledge validated by the CISSP certification. The book is packaged with a CD that is an invaluable tool for those seeking certification. It includes sample exams that simulate the actual exam, providing the same number and types of questions with the same allotment of time allowed. It even grades the exam, provides correct answers, and identifies areas where more study is needed.

Ein und zweidimensionale NMR Spektroskopie

Author: Horst Friebolin
Publisher: John Wiley & Sons
ISBN: 9783527334926
Release Date: 2013-02-01
Genre: Nuclear magnetic resonance spectroscopy

Diese vollstandig uberarbeitete und aktualisierte Neuauflage des klassischen Lehrbuches beinhaltet neben den Grundlagen der NMR-Spektroskopie auch die der Spektreninterpretation. Ohne viel Mathematik bietet der Text eine Einleitung und deckt somit auch den Lehrstoff von Hochschulkursen ab. Der Hauptanteil des Buches ist nach wie vor der NMR-Spektroskopie an Losungen gewidmet, doch wurden auch verstarkt Untersuchungen an Festkorpern und die Analyse von Biopolymeren berucksichtigt. Zum Schluss werden einige Einsatzmoglichkeiten der Kernspintomographie und der Kombination von Tomographie und Spektroskopie besprochen. Erganzt wurde jedes Kapitel um Aufgaben, deren Losungsvorschlage im Anschluss an Kapitel 14 zu finden sind. Mit seiner ubersichtlichen Darstellung ist dieses Buch ein Muss fur Studenten, Dozenten und Anwender der NMR-Spektroskopie in der Chemie, Biochemie und Pharmazie.

Official ISC 2 Guide to the CISSP ISSEP CBK

Author: Susan Hansche
Publisher: CRC Press
ISBN: 9781135483098
Release Date: 2005-09-29
Genre: Computers

The Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certification and Accreditation; Technical Management; and an Introduction to United States Government Information Assurance Regulations. This volume explains ISSE by comparing it to a traditional Systems Engineering model, enabling you to see the correlation of how security fits into the design and development process for information systems. It also details key points of more than 50 U.S. government policies and procedures that need to be understood in order to understand the CBK and protect U.S. government information. About the Author Susan Hansche, CISSP-ISSEP is the training director for information assurance at Nortel PEC Solutions in Fairfax, Virginia. She has more than 15 years of experience in the field and since 1998 has served as the contractor program manager of the information assurance training program for the U.S. Department of State.

Kuckucksei

Author: Clifford Stoll
Publisher: S. Fischer Verlag
ISBN: 9783105607244
Release Date: 2015-11-16
Genre: Fiction

›Kuckucksei‹ schildert bis ins Detail die hochdramatische Jagd nach deutschen Hackern, die in amerikanische Computernetze eingedrungen waren. Es ist der autobiografische Report eines amerikanischen Computercracks, der leidenschaftlich für die Sicherheit der Datennetze kämpft. (Dieser Text bezieht sich auf eine frühere Ausgabe.)