Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 


or
Sign in to turn on 1-Click ordering
Sell Us Your Item
For a $11.79 Gift Card
Trade in
Kindle Edition
Read instantly on your iPad, PC, Mac, Android tablet or Kindle Fire
Buy Price: $49.59
Rent From: $17.88
 
 
 
More Buying Choices
Have one to sell? Sell yours here

Official (ISC)2® Guide to the ISSMP® CBK® ((ISC)2 Press) [Hardcover]

ISC)² Corporate , Harold F. Tipton
4.0 out of 5 stars  See all reviews (3 customer reviews)

Buy New
$79.75 & FREE Shipping. Details
Rent
$55.00 & FREE Shipping. Details
Only 18 left in stock (more on the way).
Ships from and sold by Amazon.com. Gift-wrap available.
In Stock.
Want it Tuesday, July 15? Choose One-Day Shipping at checkout. Details
Free Two-Day Shipping for College Students with Amazon Student

Formats

Amazon Price New from Used from
 
Kindle Edition
Rent from
$49.59
$17.88
 
Hardcover $79.75  
Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now
There is a newer edition of this item:
Official (ISC)2® Guide to the ISSMP® CBK®, Second Edition ((ISC)2 Press) Official (ISC)2® Guide to the ISSMP® CBK®, Second Edition ((ISC)2 Press)
Sign up to be notified when this item becomes available.

Book Description

April 11, 2011 1420094432 978-1420094435 1

As the recognized leader in the field of information security education and certification, the (ISC)promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) examination assesses individuals’ understanding of security management practices. Obtaining certification validates your ability to create and implement effective information security management programs that meet the security needs of today’s organizations.

Preparing professionals for certification and job readiness, the Official (ISC) Guide to the ISSMP® CBK® supplies a complete overview of the management topics related to information security. It provides for an expanded enterprise model of security and management that delves into project management, risk management, and continuity planning. Facilitating the mastery of the five ISSEP domains required for certification, the book includes authoritative coverage of enterprise security management, enterprise-wide system development, compliance of operations security, business continuity planning, disaster recovery planning, as well as legal and ethical considerations.

  • Presents a complete overview of the managerial elements related to information security
  • Examines a larger enterprise model of security and management
  • Provides an all-inclusive analysis of the five domains of the CISSP-ISSMP CBK—including sample questions for each domain

Representing over a century of combined experience working at the forefront of information security, the editor and distinguished team of contributors provide unprecedented coverage of the things you need to know to achieve certification. This book will not only help you prepare for the CISSP-ISSMP certification exam, but also provide you with a solid foundation to enhance your career path—whether you’re a seasoned security veteran or just starting out.


Frequently Bought Together

Official (ISC)2® Guide to the ISSMP® CBK® ((ISC)2 Press) + Official (ISC)2® Guide to the ISSAP® CBK, Second Edition ((ISC)2 Press) + CISSP Concentration Exams (ISSAP, ISSMP and ISSEP) ExamFOCUS Study Notes & Review Questions 2014
Price for all three: $178.51

Buy the selected items together

Customers Who Bought This Item Also Bought


Editorial Reviews

About the Author

About the Editor:

Hal Tipton, currently an independent consultant, is a past president of the International Information System Security Certification Consortium and was a director of computer security for Rockwell International Corporation for about 15 years. He initiated the Rockwell computer and data security program in 1977 and then continued to administer, develop, enhance, and expand the program to accommodate the control needs produced by technological advances until his retirement from Rockwell in 1994.

Tipton has been a member of the Information Systems Security Association (ISSA) since 1982. He was the president of the Los Angeles chapter in 1984 and the president of the national organization of ISSA (1987–1989). He was added to the ISSA Hall of Fame and the ISSA Honor Role in 2000.

Tipton was a member of the National Institute for Standards and Technology (NIST), the Computer and Telecommunications Security Council, and the National Research Council Secure Systems Study Committee (for the National Academy of Sciences). He received his BS in engineering from the U.S. Naval Academy and his MA in personnel administration from George Washington University; he also received his certificate in computer science from the University of California at Irvine. He is a certified information system security professional (CISSP), ISSAP, and ISSMP.

He has been a speaker at all the major information security conferences including the following: Computer Security Institute, the ISSA Annual Working Conference, the Computer Security Workshop, MIS Conferences, AIS Security for Space Operations, DOE Computer Security Conference, National Computer Security Conference, IIA Security Conference, EDPAA, UCCEL Security & Audit Users Conference, and Industrial Security Awareness Conference.

He has conducted/participated in information security seminars for (ISC)2, Frost & Sullivan, UCI, CSULB, System Exchange Seminars, and the Institute for International Research. He participated in the Ernst & Young video "Protecting Information Assets." He is currently the editor of the Handbook of Information Security Management (Auerbach Publications). He chairs the (ISC)2 CBK Committees and the QA Committee. He received the Computer Security Institute’s Lifetime Achievement Award in 1994, the (ISC)2’s Hal Tipton Award in 2001, and the (ISC)2 Founders Award in 2009.

About the Contributors:

James Litchko, CISSP-ISSEP, CAP, MBCI, CMAS, Senior Security Expert, Litchko & Associates. Mr. Litchko has worked as a security and management expert for over 30 years. He has been an executive with five organizations and supervised and supported the securing of over 200 military, government, and commercial IT systems. Since 2008, he supported the securing of IT systems at DHS, DOE, VHA, NASA, EPA, USAF, DOJ, and FEMA. Jim created and taught the first graduate IT security course at Johns Hopkins University (JHU) and was a manager at NSA. Jim holds a masters degree from JHU and has authored five books on security and management topics.

Craig S. Wright, CISSP-ISSAP, ISSMP, is a director with Information Defense in Australia. He holds both the GSE-Malware and GSE-Compliance certifications from GIAC. He is a perpetual student with numerous postgraduate degrees including an LLM specializing in international commercial law and ecommerce law, a masters degree in mathematical statistics from Newcastle, and is working on his fourth IT-focused masters degree (in system development) at Charles Stuart University, Australia, where he lectures on subjects in digital forensics. He is writing his second doctorate on the quantification of information system risk at CSU.

Cheryl Hennell, EdD, MSc, CISSP, SBCI, has worked in the IT industry for 40 years. Her employment includes systems development for the Ministry of Defence, systems analysis for the Civil Service, European Consultancy for a blue chip organization, and 20 years as a senior university lecturer. She is currently head of IT and information assurance for Openreach, BT. She earned her master’s in information systems design from Kingston University, London, and her doctorate from the University of Southampton, UK, and is a specialist in the Business Continuity Institute, UK. She is also an ambassador for Childnet. Cheryl was the course director for the first digital forensics degree in the UK, which she created and delivered for the University of Portsmouth. She has been an invited speaker at international conferences in Europe, the Middle East, and Africa. Her subjects include information assurance, audit, risk and governance, physical security, and business continuity and disaster recovery.

Maura van der Linden spent over a decade in software testing at Microsoft Corporation with a specialization in security testing, including working in the Security Technology Unit on the Malware Response Team. After serving as a technical reviewer for MSDN Magazine, she wrote her first article on SQL injection testing for MSDN Magazine. She then wrote her first book, Testing Code Security, Auerbach, Boca Raton, FL, in order to teach other testers the need for and intricacy of security testing. Though now working as a programming writer, she maintains her close ties to the test and security communities.

Keith Willet, CISSP-ISSAP, has over 25 years experience in information technology spanning academia and commercial, local, and national governments. Mr. Willett has a BS in computer science from Towson University, Maryland, an MS in business from the University of Baltimore, Maryland, and an MSIA from Norwich University, Vermont, and he holds the CISSP and ISSAP designations from (ISC)2. Willett is the author of Information Assurance Architecture and coauthor of How to Achieve 27001 Certification, both published by Auerbach. When not working, Mr. Willet enjoys world travel, cuisine, and wine, and has enjoyed all in over 125 cities across 30 countries.

 


Product Details

  • Series: (ISC)2 Press
  • Hardcover: 468 pages
  • Publisher: Auerbach Publications; 1 edition (April 11, 2011)
  • Language: English
  • ISBN-10: 1420094432
  • ISBN-13: 978-1420094435
  • Product Dimensions: 9.3 x 6.2 x 1.2 inches
  • Shipping Weight: 1.8 pounds (View shipping rates and policies)
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #537,537 in Books (See Top 100 in Books)

Customer Reviews

4.0 out of 5 stars
(3)
4.0 out of 5 stars
5 star
0
3 star
0
2 star
0
1 star
0
Share your thoughts with other customers
Most Helpful Customer Reviews
5 of 5 people found the following review helpful
4.0 out of 5 stars Passed the ISSMP just using this book January 19, 2013
Format:Hardcover|Verified Purchase
Unlike the ISSEP ISC2 book the ISSMP one is relatively current. I started reading the book in October and took the exam in December - and thanks to the new testing format found out my result instantly. I think the ISSMP is a simpler exam than the ISSEP since it is somewhat more generic. I would say that the exam is somewhat of a crap shoot even after reading the book and I would suggest printing out material on some of the more substantial topics covered. Having put the time in to study and pass the exam I have to be honest and say I am not sure it really has benefited me getting an ISSMP - just being honest. Good luck.
Comment | 
Was this review helpful to you?
3 of 3 people found the following review helpful
4.0 out of 5 stars Book contents May 8, 2013
Format:Kindle Edition|Verified Purchase
I had received the 2011 Kindle edition a few months ago; but I recently learned that the domain names changed, and that new contents were added. It would be great to understand if the contents on the Kindle 2013 edition been updated from the 2011 edition to match such added contents and new domain names. It also would have been great to know that the CBK was about to be updated and that the 2011 edition was not up-to-date.
Comment | 
Was this review helpful to you?
1 of 1 people found the following review helpful
4.0 out of 5 stars Well, I passed May 5, 2014
Format:Kindle Edition|Verified Purchase
I read through the book once. Nothing groundbreaking. Nothing special. Nothing made me go "AH HA!". It's just a book about strategic security management. Flows nicely.
Comment | 
Was this review helpful to you?
Search Customer Reviews
Search these reviews only


Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 



Look for Similar Items by Category