標題:

CISSP要如何準備呢?

發問:

CISSP要如何準備呢? 範圍太大了 , 考過的人指點一下迷津

最佳解答:

CISSP 的官網提供考生的參考書單如下 Official (ISC)2 Guide to the CISSP? Exam Susan Hansche, CISSP John Berti, CISSP Chris Hare, CISSP ISBN: 0-8493-1707-X Available from (ISC)2 Company Store Information Security Management Handbook, Fifth Edition Micki Krause, CISSP (Editor) Harold F. Tipton, CISSP (Editor) CRC Press - Auerbach Publications ISBN: 0849398290 Available from (ISC)2 Company Store Information Security Management Handbook, Fifth Edition (CD-ROM edition) Micki Krause, CISSP (Editor) Harold F. Tipton, CISSP (Editor) CRC Press - Auerbach Publications ISBN: 0849398290 Available from (ISC)2 Company Store Computer Security Basics Deborah Russell G. T. Gangemi, CISSP O'Reilly & Associates ISBN: 0937175714 Available from amazon.com Practical Unix & Internet Security Simson Garfinkel, CISSP Gene Spafford O'Reilly & Associates ISBN: 1565921488 Available from amazon.com Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition Bruce Schneier John Wiley & Sons ISBN: 0471117099 Available from amazon.com Fighting Computer Crime: A New Framework for Protecting Information Donn B. Parker, CISSP John Wiley & Sons ISBN: 0471163783 Available from amazon.com Information Security Policies Made Easy Charles C. Wood, CISSP Baseline Software ISBN: 1881585069 Available from amazon.com Corporate Espionage : What It Is, Why It Is Happening in Your Company What You Must Do About It Ira Winkler, CISSP Prima Publishing ISBN: 0761518096 Available from amazon.com The NCSA Guide to Enterprise Security : Protecting Information Assets Michel E. Kabay, CISSP McGraw Hill Text ISBN: 0070331472 Available from amazon.com Computer Security Handbook, Third Edition Arthur E. Hutt (Editor) Seymour Bosworth (Editor) Douglas B. Hoyt (Editor) John Wiley & Sons, New York ISBN 0-471-11854-0 Available from amazon.com Information Warfare and Security Dorothy Denning, CISSP Addison-Wesley ISBN:0-201-43303-6 Available from amazon.com Internet Besieged Dorothy Denning, CISSP Addison-Wesley ISBN: 0-201-30820-7 Available from amazon.com Computer Security Dieter Gollmann John Wiley & Sons ISBN: 0-471-97844-2 Available from amazon.com Java Security Scott Oaks O'Reilly & Associates ISBN 1-56592-403-7 Available from amazon.com Network Intrusion Detection: An Analysis Handbook Stephen Northcutt New Riders Publishing ISBN: 0735708681 Available from amazon.com Encyclopedia of Disaster Recovery, Security & Risk Management Tari Schreider Crucible Publishing Works ISBN: 0966272900 Available from amazon.com (ISC)2 Reference Library (As of March 2000) The following books are part of the (ISC)2 Reference Library. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition Bruce Schneier, 1996 John Wiley and Sons ISBN 0-471-11709-9 CCTV Surveillance, Video Practices and Technology Herman Kruegle, 1995 Butterworth-Heinemann ISBN 0-7506-9028-3 (paperback) Commonsense Computer Security, Your Practical Guide to Information Protection, 2nd Edition Martin Smith, 1993 McGraw-Hill ISBN 0-07-707805-5 Communications Networks, A First Course, 2nd Edition Jean Walrand, 1998 WCB/ McGraw-Hill ISBN 0-256-17404-0 Computer and Communications Security: Strategies for the 1990's James Arlin Cooper, 1989 McGraw-Hill ISBN 0-07-012926-6 Computer Crime: A Crime Fighter's Handbook David Icove, Karl Seger, and William VonStorch, 1995 O'Reilly and Associates ISBN 1-56592-086-4 Computer Ethics, 2nd Edition Tom Forester and Perry Morrison, 1995 MIT Press ISBN 9-780262-560733 Computer Security Basics Russell, Deborah and G. T. Gangemi, Sr. Sebastapol O'Reilly and Associates, 1991 ISBN 0-937175-71 Computer Security Handbook, 3rd Edition Edited By Arthur E. Hutt, Seymour Bosworth, and Douglas B. Hoyt, 1995 John Wiley & Sons ISBN 0-471-11854-0 (acid-free paper) Computer Viruses: How to Avoid Them, How to Get Rid of Them, and How to Get Help, 2nd Edition Robert Slade, 1996 Springer-Verlag ISBN 0-387-94663-2 Computers At Risk: Safe Computing In the Information Age, System Security Study Committee, 1991 National Academy Press ISBN 0-309-04388-3 Computers, Ethics, and Society, 2nd Edition M. David Ermann, Mary B. Williams, and Michele S. Shauf, 1997 Oxford University Press ISBN 0-19-510756-X Cryptography's Role in Securing the Information Society Kenneth W. Dam and Herbert S. Lin, Editors, 1996 National Academy Press ISBN 0-309-05475-3 Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves Randall K. Nichols, Daniel J. Ryan, and Julie J.C.H. Ryan, 2000 McGraw Hill ISBN 0-07-212285-4 E-Mail Security: How to Keep Your Electronic Messages Private Bruce Schneier, 1995 John Wiley & Sons ISBN 0-471-05318-X Fighting Computer Crime, A New Framework for Protecting Information Donn B. Parker, 1998 John Wiley & Sons ISBN 0-471-16378-3 Fundamentals of Computer Security Technology Edward Amoroso, 1994 Prentice Hall ISBN 0-13-108929-3 Glossary of INFOSEC and INFOSEC Related Terms, Volume 1 Compiled by Corey D. Schou, CISSP Information Systems Security Organization, Idaho State University, 28 August 1996 Glossary of INFOSEC and INFOSEC Related Terms, Volume 2 Compiled by Corey D. Schou, CISSP Information Systems Security Organization, Idaho State University, 28 August 1996 Hacker Proof: The Ultimate Guide to Network Security Lars Klarder, 1997 Jamsa Press ISBN 1-884133-55-X Hacking Exposed: Network Security Secrets and Solutions Stuart McClure, Joel Scambray, and George Kurtz, 1999 Osborne/McGraw Hill ISBN 0-07-212127-0 Handbook of IS Management, 5th Edition Robert E. Umbaugh, Editor, 1997 Auerbach, RIA Group ISBN 0-7913-2890-2 Handbook of Information Security Management Micki Krause, CISSP, Harold F. Tipton, CISSP, Editors, 2000 Auerbach ISBN 0-8493-9829-0 Handbook of Information Security Management Micki Krause, CISSP, Harold F. Tipton, CISSP, Editors, 1999 Auerbach ISBN 1-8493-9974-2 Handbook of Information Security Management Micki Krause, CISSP, Harold F. Tipton, CISSP, Editors, 1998 Auerbach ISBN 0-8493-9974-5 Handbook of Information Security Management Zella G. Ruthberg, Harold F. Tipton, CISSP, Editors, 1993 Auerbach ISBN 0-7913-1636-X Handbook of Information Security Management, 1996-97 Yearbook Micki Krause, CISSP, Harold F. Tipton, CISSP, Editors, 1996 Auerbach ISBN 0-7913-2562-8 Handbook of Information Security Management, 1994-95 Yearbook Zella G. Ruthberg Harold F. Tipton, Editors, 1994 Auerbach ISBN 0-7913-2073-1 Information Integrity: A Structure for Its Definition and Management Hal B. Becker, 1983 McGraw-Hill ISBN 0-07-004191-1 Information Systems Security: A Practitioner's Reference Phillip E. Fites and Martin P.J. Kratz. 1996 International Thomson Computer Press ISBN 1-85032-828-5 Information Systems Security Officer's Guide, Establishing and Managing an Information Protection Program Dr. Gerald L. Kovacich, 1998 Butterworth-Heinemann ISBN -7506-9896-9 Internet Security Professional Reference Derek Atkins, Paul Buis, Chris Hare, Robert Kelley, Carey Nachenberg, Anthony B. Nelson, Paul Phillips, Tim Ritchey, William Steen, 1996 New Riders Publishing ISBN 1-56205-557-7 Intrusion Detection, Network Security Beyond the Firewall Terry Escamilla, 1998 John Wiley & Sons ISBN 0-471-29000-9 JAVAJ Security, Scott Oaks, 1998 O'Reilly & Associates ISBN 1-56592-403-7 Mastering Network Security Chris Brenton, 1999 Network Press, (SYBEX) ISBN 0-7821-2343-0 Maximum Security, A Hacker's Guide to Protecting Your Internet Site and Network, 2nd Edition Anonymous, 1998 Sams Publishing ISBN 0-672-31341-3 Network Security, Data and Voice Communications Fred Simonds, 1996 McGraw-Hill, (series on computer communications) ISBN 0-07-057634-3 Secure Computing: Threats and Safeguards Rita C. Summers, 1997 McGraw-Hill ISBN 0-07-069419-2 Security, ID Systems and Locks, The Book on Electronic Access Control Joel Konicek and Karen Little, 1997 Butterworth-Heinemann ISBN 0-7506-9932-9 Software Engineering Risk Analysis and Management Robert N. Charette, 1989 Intertext Publications ISBN 0-07-010661 Standard for Auditing Computer Applications Martin A. Krist, 1999 Auerbach ISBN 0-8493-9983-1 The NCSA Guide to PC and LAN Security Stephen Cobb, 1996 McGraw-Hill ISBN 0-07-912168-3 Time-Based Security, Practical and Provable Methods to Protect Enterprise and Infrastructure Networks and Nation Winn Schwartau, 1999 Interpact Press ISBN 0-9628700-4-8 Understanding Data Communications, 4th Edition Gilbert Held (Revision Editor), 1994 Sams Publishing ISBN 0-672-30501-1 Virtual Private Networks, 2nd Edition Charlie Scott, Paul Wolfe, and Mike Erwin, 1999 O'Reilly and Associates ISBN 1-56592-529-7 Voice and Data Communications Handbook Regis J. Bates, Donald W. Gregory, J. Ranade, Series Editor, 1998 McGraw-Hill ISBN 0-07-006396-6 Web Security Amrit Tiwana, 1999 Butterworth-Heinemann ISBN 1-55558-210-9 Web Security and Commerce Simson Garfunkel with Gene Spafford, 1997 O'Reilly and Associates ISBN 1-56592-269-7 Web Security Sourcebook, A Complete Guide to Web Security Threats and Solutions Aviel D. Rubin, Daniel Geer, and Marcus J. Ranum, 1997 John Wiley & Sons ISBN 0-471-18148-X Viruses Revealed David Harley, Robert Slade, and Urs Gattiker ISBN: 0-07-213090-3 Available from amazon.com National Institute of Standards and Technology publications NIST Special Publication 800-10 Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls December 1994 NIST Special Publication 800-12 An Introduction to Computer Security: The NIST Handbook October 1995 NIST Special Publication 800-14 Generally Accepted Principles and Practices for Securing Information Technology Systems September 1996 NISTIR 5153 Minimum Security requirements for Multi-User Operating Systems March 1993 Other publications Federal Information Processing Standards (FIPS) Pub 41 Computer Security Guidelines for Implementing the Privacy Act of 1974 May 30, 1975 或是參加官方在台舉辦的講座. CISSP 基本上算是網路安全的中高階證照,除了通過考試 (700分以上),還要提出四年以上全職的專業網路安全工作經驗證明,並不適合作為個人的第一張網路安全證照.

 

此文章來自奇摩知識+如有不便請留言告知

其他解答:6FE1C172A843305D
arrow
arrow
    文章標籤
    D. 何準備 E. A. 第一
    全站熱搜

    gpjqem1 發表在 痞客邦 留言(0) 人氣()