Exam Review Guide - Prometric

Exam Review Guide - Prometric Exam Review Guide - Prometric

prometric.com
from prometric.com More from this publisher
01.06.2014 Views

Reference Materials and Resources You will want to arm yourself with some of the more helpful texts. The authors of this document found the following books and online resources to be helpful. You are also fortunate that there are now lots of books hitting the CISSP marketplace. Just go to a bookseller of your choice (e.g., Amazon) and search on topics such as “CISSP.” Books 1. Amies, Alex; Sluiman, Harm; Liu, Guo Ning, Infrastructure as a Service Cloud Concepts, (2012) -Developing and Hosting Applications on the Cloud. IBM Press. 2. Bosworth, Seymour & Kabay, M.E. & (eds), Eric Whyne. Computer Security handbook, fifth edition. ISBN:9780471716525. 3. Grimes, Roger A., Honeypots for windows., (2005) -Page # of reference: Chapter 1: An Introduction to Honeypots ISBN:9781590593356. 4. Haines, Brad., Seven Deadliest Wireless Technologies Attacks., (2010). ADVANCED WPA AND WPA2 CRACKING ISBN:9781597495417. 5. Ingram, D., Design - Build - Run: Applied Practices and Principles for Production-Ready Software Development. (2009). 6. Krause, Micki; Tipton, Harold F., Information Security Management Handbook (Fourth Edition), (1997), (2009), CRC Press/Auerbach Publications. ISBN-10: 0849308003, ISBN-13: 978-0849308000. This is what some consider the classic text. 7. Ligh, Michael Hale; Adair, Steven; Hartstein, Blake; Richard, Matthew., Malware Analyst’s Cookbook: Tools and Techniques for Fighting Malicious Code. (2011). ISBN:9780470613030. 8. Littlejohn Shinder, Debra; Cross, Michael, Scene of the Cybercrime, Second Edition. 9. Lowe, Doug, Networking all-in-one for dummies, (2011) -Pg: Controlling User Access with Permissions ISBN:9780470625873. 10. National Institute of Standard and Technology (NIST) Special Publications – various. 11. Orebaugh, A.; Pinkard, B., Nmap In the Enterprise: Your Guide to Network Scanning, (2008) -Chapter 1 - Introducing Network Scanning ISBN:9781597492416. 12. Prowell, Stacy; Kraus, Rob; Borkin, Mike, Seven Deadliest Network Attacks, (2010) -Chapter 2: War Dialing ISBN:9781597495493. 13. Stallings, W, Network Security Essential (2rd edition). (2003) -Pg; 88-89. 14. Whitman, Michael E., Mattord, Herbert J., and Green, A. (2012). Guide to Firewalls and VPNs (3rd edition). Course Technology: Boston, MA. 15. Vyncke, Eric; Paggen, Christopher., Lan Switch Security: What Hackers Know About Your Switches: A Practical Guide to Hardening Layer 2 Devices and Stopping Campus Network Attacks., (2008). ISBN:9781587052569. 16. Whitman, Michael E. and Mattord, Herbert J. (2009). Principles of Information Security (3rd edition). Course Technology: Boston, MA. Prometric | Canton Crossing Tower | 1501 South Clinton Street | Baltimore MD 21224 www.prometric.com 8

Internet The Web is a fantastic source for material, too. A search with the “CISSP” key word, for example, will result in lots of material. In addition, a search on the Domain titles will uncover lots of material, too. Here are some of the better Web sources we recommend: https://www.owasp.org - OWASP - The Open Web Application Security Project http://www.postcastserver.com http://www.n2net.net http://www.pcmag.com/encyclopedia_term/0,1237,t=whitelist&i=54441,00.asp http://www.infosecurity-magazine.com/view/26475/whitelisting-is-the-solution-for-the-national-infrastructure/ http://www.postcastserver.com/help/Internet_Black_and_White_Lists.aspx http://netforbeginners.about.com http://www.us-cert.gov http://www.sans.edu/research/security-laboratory/article/it-separation-duties - SANS Technology Institute http://www.openxtra.co.uk/articles/data-center-environmental http://www.dna.gov http://www.active-directory-privilege-escalation-security-risks.com/2012/07/in-this-post-we-will-look-at-3-primary.html http://www.theiia.org http://www.ietf.org - The Internet Engineering Task Force (IETF) http://www.domaintools.com http://www.auditnet.org https://www.ncjrs.gov – National Criminal Justice Reference Service http://searchvmware.techtarget.com http://www.unesco.org – United Nations Educational, Scientific and Cultural Organization http://www.clir.org – Council on Library and Information Resources Prometric | Canton Crossing Tower | 1501 South Clinton Street | Baltimore MD 21224 www.prometric.com 9

Reference Materials and Resources<br />

You will want to arm yourself with some of the more helpful texts. The authors of this document found the following books<br />

and online resources to be helpful. You are also fortunate that there are now lots of books hitting the CISSP marketplace.<br />

Just go to a bookseller of your choice (e.g., Amazon) and search on topics such as “CISSP.”<br />

Books<br />

1. Amies, Alex; Sluiman, Harm; Liu, Guo Ning, Infrastructure as a Service Cloud Concepts, (2012) -Developing and<br />

Hosting Applications on the Cloud. IBM Press.<br />

2. Bosworth, Seymour & Kabay, M.E. & (eds), Eric Whyne. Computer Security handbook, fifth edition.<br />

ISBN:9780471716525.<br />

3. Grimes, Roger A., Honeypots for windows., (2005) -Page # of reference: Chapter 1: An Introduction to Honeypots<br />

ISBN:9781590593356.<br />

4. Haines, Brad., Seven Deadliest Wireless Technologies Attacks., (2010). ADVANCED WPA AND WPA2 CRACKING<br />

ISBN:9781597495417.<br />

5. Ingram, D., Design - Build - Run: Applied Practices and Principles for Production-Ready Software Development.<br />

(2009).<br />

6. Krause, Micki; Tipton, Harold F., Information Security Management Handbook (Fourth Edition), (1997), (2009), CRC<br />

Press/Auerbach Publications. ISBN-10: 0849308003, ISBN-13: 978-0849308000. This is what some consider<br />

the classic text.<br />

7. Ligh, Michael Hale; Adair, Steven; Hartstein, Blake; Richard, Matthew., Malware Analyst’s Cookbook: Tools and<br />

Techniques for Fighting Malicious Code. (2011). ISBN:9780470613030.<br />

8. Littlejohn Shinder, Debra; Cross, Michael, Scene of the Cybercrime, Second Edition.<br />

9. Lowe, Doug, Networking all-in-one for dummies, (2011) -Pg: Controlling User Access with Permissions<br />

ISBN:9780470625873.<br />

10. National Institute of Standard and Technology (NIST) Special Publications – various.<br />

11. Orebaugh, A.; Pinkard, B., Nmap In the Enterprise: Your <strong>Guide</strong> to Network Scanning, (2008) -Chapter 1 -<br />

Introducing Network Scanning ISBN:9781597492416.<br />

12. Prowell, Stacy; Kraus, Rob; Borkin, Mike, Seven Deadliest Network Attacks, (2010) -Chapter 2: War Dialing<br />

ISBN:9781597495493.<br />

13. Stallings, W, Network Security Essential (2rd edition). (2003) -Pg; 88-89.<br />

14. Whitman, Michael E., Mattord, Herbert J., and Green, A. (2012). <strong>Guide</strong> to Firewalls and VPNs (3rd edition). Course<br />

Technology: Boston, MA.<br />

15. Vyncke, Eric; Paggen, Christopher., Lan Switch Security: What Hackers Know About Your Switches: A Practical<br />

<strong>Guide</strong> to Hardening Layer 2 Devices and Stopping Campus Network Attacks., (2008). ISBN:9781587052569.<br />

16. Whitman, Michael E. and Mattord, Herbert J. (2009). Principles of Information Security (3rd edition). Course<br />

Technology: Boston, MA.<br />

<strong>Prometric</strong> | Canton Crossing Tower | 1501 South Clinton Street | Baltimore MD 21224<br />

www.prometric.com 8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!