Well regarded for its engaging and informative style, CISSP All-in-One
Exam Guide provides 100% complete coverage of the exam objectives for
the Certified Information Security Specialist credentialing exam from
(ISC)2. Updated to ensure total coverage of the latest body of knowledge
from (ISC)2, this new edition also provides references for government
employees and contractors subject to new requirements.
Exam tips highlight actual exam topics and technical discussion sidebars offer a level of instruction not found in other certification guides. The All-in-One also includes hands-on examples and exercises that reinforce practical learning and sample practice questions at the end of each chapter that test for comprehension and prepare readers for each subject area or domain of the exam.
![](http://img8a.flixcart.com/www/prod/images/buy_btn_3-0b867813.png)
Table of Contents
Exam tips highlight actual exam topics and technical discussion sidebars offer a level of instruction not found in other certification guides. The All-in-One also includes hands-on examples and exercises that reinforce practical learning and sample practice questions at the end of each chapter that test for comprehension and prepare readers for each subject area or domain of the exam.
About the Author
Shon Harris MCSE, CISSP, is the president of Logical Security, a security consultant, a former engineer in the U.S. Air Force's Information Warfare unit, an instructor, and the bestselling author of CISSP All-in-One Exam Guide, now in its sixth edition. She was recognized as one of the top 25 women in the information security field by Information Security Magazine.![](http://img8a.flixcart.com/www/prod/images/buy_btn_3-0b867813.png)
Table of Contents
- Chapter 1 Becoming a CISSP
- Chapter 2 Information Security Governance and Risk Management
- Chapter 3 Access Control
- Chapter 4 Security Architecture and Design
- Chapter 5 Physical and Environmental Security
- Chapter 6 Telecommunications and Network Security
- Chapter 7 Cryptography
- Chapter 8 Business Continuity and Disaster Recovery
- Chapter 9 Legal, Regulations, Compliance, and Investigations
- Chapter 10 Software Development Security
- Chapter 11 Security Operations
- Appendix A Comprehensive Questions
- Appendix B About the CD-ROM
- Index