You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
For those preparing for the Certified Protection Professional program and designation, The Complete Guide for CPP Examination Preparation provides a thorough foundation of essential security concepts and practices in a single volume. This guide does more than impart the information required for you to pass the CPP exam, it also delivers insight in
For those preparing for the Certified Protection Professional® program and designation, The Complete Guide for CPP Examination Preparation provides a thorough foundation of essential security concepts and practices in a single volume. This guide does more than impart the information required for you to pass the CPP exam, it also delivers insight into what taking the exam is like, and provides an appreciation for the work and knowledge needed to gain CPP certification. The book addresses ten critical areas: security management, investigations, protection of sensitive information, substance abuse, physical security, personnel security, emergency planning, management of a guard force, legal aspects of security, and the role of a security professional as a liaison with both management and law enforcement. The authors include sample test questions for you to take after completing each of the areas of study. Although these are not questions that appear on the actual exam, they do convey the principles and concepts that the exam emphasizes, and are valuable in determining if you have mastered the required information.
Written by a team of Certified Protection Professionals (CPPs) and led by an ASIS CPP instructor with seven years of experience, this book provides an overview of the fundamental concepts and practices of security management and offers important insights into the CPP exam. In addition to an introduction to the purposes and concepts of the book a
The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry's first and only CBK, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK conti
The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry’s first and only CBK®, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as the basis for (ISC)2’s education and certification programs. Unique and exceptionally thorough, the Official (ISC)2® Guide to the CISSP®CBK®provides a better understanding of the CISSP CBK — a collection of topics relevant to information security professionals around the world. Although the book still contains the ten domains of the CISSP, so...
The Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certification and Accreditation; Technical Management; and an Introduction to United States Government Information Assurance Regulations. This volume explains ISSE by comparing it to a traditional Systems Engineering model, enabling you to see the correlation of how security fits into the design and development process for information systems. It also d...
Organizational Crisis Management: The Human Factor offers theoretical background and practical strategies for responding to workplace crises. Responding to a paradigm that focuses on the operational aspects of continuity to the detriment of human factors, this volume provides a comprehensive understanding of the unavoidable yet often complex reacti
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. From short text messaging to investigating war, this book explores all aspects of wireless technology, including how it is used in daily life and how it might be used in the future. It provides a one-stop resource on the types of wireless crimes that are being committed and the forensic investigation techniques that are used for wireless devices and wireless networks. The author provides a solid understanding of modern wireless technologies, wireless security techniques, and wireless crime techniques, and shows how to conduct forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, is self-contained for quick comprehension.
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management. Off