CISSP All-in-One Exam Guide
<p><font face="Times New Roman, serif"><b>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, <span style="white-space:pre"></span>authenticity, or access to any online entitlements included with the product.</b></font></p><p><span style="FONT-SIZE: 12pt; FONT-FAMILY: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman"; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold"><b><br></b></span></p><p><span style="FONT-SIZE: 12pt; FONT-FAMILY: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman"; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold"><b>A fully revised edition of the #1 CISSP training resource</b></span></p><span style="FONT-SIZE: 12pt; FONT-FAMILY: "Times New Roman","serif"; mso-fareast-font-family: "Times New Roman"; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-bidi-font-weight: bold"><p class="MsoBodyText" style="MARGIN: 0in 0in 0pt"><span style="mso-bidi-font-size: 12.0pt">Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all exam domains, as well as the new</span><span style="mso-bidi-font-size: 11.0pt"> 2015 CISSP Common Body of Knowledge developed by the International Information Systems Security Certification Consortium (ISC)<sup>2®</sup></span><span style="mso-bidi-font-size: 12.0pt">. <i>CISSP All-in-One Exam Guide, Seventh Edition</i> features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Written by leading experts in IT security certification and training, this completely up-to-date self-study system helps you pass the exam with ease and also serves as an essential on-the-job reference.<!--?xml:namespace prefix = "o" ns = "urn:schemas-microsoft-com:office:office" /--><o:p></o:p></span></p><p class="MsoNormal" style="MARGIN: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto"><span style="FONT-SIZE: 12pt">Covers all 8 CISSP domains:<o:p></o:p></span></p><ul type="disc"><li class="MsoNormal" style="MARGIN: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-list: l1 level1 lfo2; tab-stops: list .5in"><span style="FONT-SIZE: 12pt">Security and risk management<o:p></o:p></span></li><li class="MsoNormal" style="MARGIN: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-list: l1 level1 lfo2; tab-stops: list .5in"><span style="FONT-SIZE: 12pt">Asset security<o:p></o:p></span></li><li class="MsoNormal" style="MARGIN: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-list: l1 level1 lfo2; tab-stops: list .5in"><span style="FONT-SIZE: 12pt">Security engineering<o:p></o:p></span></li><li class="MsoNormal" style="MARGIN: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-list: l1 level1 lfo2; tab-stops: list .5in"><span style="FONT-SIZE: 12pt">Communication and network security<o:p></o:p></span></li><li class="MsoNormal" style="MARGIN: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-list: l1 level1 lfo2; tab-stops: list .5in"><span style="FONT-SIZE: 12pt">Identity and access management<o:p></o:p></span></li><li class="MsoNormal" style="MARGIN: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-list: l1 level1 lfo2; tab-stops: list .5in"><span style="FONT-SIZE: 12pt">Security assessment and testing<o:p></o:p></span></li><li class="MsoNormal" style="MARGIN: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto; mso-list: l1 level1 lfo2; tab-stops: list .5in"><span style="FONT-SIZE: 12pt">Security operations<o:p></o:p></span></li></ul></span>