By Ronald L. Krutz, Russell Dean Vines
* Prepares readers for the qualified info defense supervisor (CISM) examination, ISACA's new certification that launches in June 2003
* CISM is business-oriented and meant for the person who needs to deal with, layout, oversee, and examine an enterprise's info security
* crucial studying if you happen to are cramming for this new try and want an authoritative examine guide
* Many out-of-work IT pros are trying to find protection administration certification as a motor vehicle to re-employment
* CD-ROM incorporates a Boson-powered try out engine with all of the questions and solutions from the publication
Read or Download The CISM Prep Guide: Mastering the Five Domains of Information Security Management PDF
Similar Comptia books
Best-of-the-best guidance for dealing with low voltage wiring The A-Z reference on designing, fitting, protecting, and troubleshooting sleek safeguard and hearth alarm platforms is now totally updated in a brand new variation. ready by way of Terry Kennedy and John E. Traister, authors with over 3 many years of hands-on event apiece within the building undefined, Low Voltage Wiring: Security/Fire Alarm structures, 3rd version offers all of the applicable wiring information you want to paintings on protection and fireplace alarm structures in residential, advertisement, and business constructions.
Research in-depth perception into how hackers infiltrate e-business and the way they are often stopped. The publication includes up-to-date hacks and countermeasures, together with the newest denial of carrier assaults, electronic mail assaults, viruses, and net hacks. there's additionally insurance of home windows XP Server. The CD comprises customized scripts created, seller instruments, a default password database, and an digital define of the ebook with stay hyperlinks to the entire instruments which are referenced within the booklet.
"The booklet is of large final result and capability worth. The Java 2 Platform protection represents an increase of significant proportions, and the knowledge during this booklet is captured nowhere else. " --Peter G. Neumann, significant Scientist, SRI foreign laptop technological know-how Lab, writer of Computer-Related dangers, and Moderator of the dangers discussion board "Profound!
The Hands-On, useful consultant to fighting Ajax-Related defense Vulnerabilities a growing number of websites are being rewritten as Ajax purposes; even conventional computer software program is quickly relocating to the internet through Ajax. yet, all too usually, this transition is being made with reckless put out of your mind for defense.
Additional resources for The CISM Prep Guide: Mastering the Five Domains of Information Security Management