Official (ISC)2® Guide to the ISSAP® CBK  book cover
2nd Edition

Official (ISC)2® Guide to the ISSAP® CBK

Edited By

(ISC)² Corporate

ISBN 9781466579002
Published August 29, 2013 by Auerbach Publications
600 Pages 108 B/W Illustrations

FREE Standard Shipping
SAVE $19.99
was $99.95
USD $79.96

Prices & shipping based on shipping country


Book Description

Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.

Supplying an authoritative review of the key concepts and requirements of the ISSAP CBK, the Official (ISC) Guide to the ISSAP® CBK®, Second Edition provides the practical understanding required to implement the latest security protocols to improve productivity, profitability, security, and efficiency. Encompassing all of the knowledge elements needed to create secure architectures, the text covers the six domains: Access Control Systems and Methodology, Communications and Network Security, Cryptology, Security Architecture Analysis, BCP/DRP, and Physical Security Considerations.

Newly Enhanced Design – This Guide Has It All!

  • Only guide endorsed by (ISC)2
  • Most up-to-date CISSP-ISSAP CBK
  • Evolving terminology and changing requirements for security professionals
  • Practical examples that illustrate how to apply concepts in real-life situations
  • Chapter outlines and objectives
  • Review questions and answers
  • References to free study resources

Read It. Study It. Refer to It Often.

Build your knowledge and improve your chance of achieving certification the first time around. Endorsed by (ISC)2 and compiled and reviewed by CISSP-ISSAPs and (ISC)2 members, this book provides unrivaled preparation for the certification exam and is a reference that will serve you well into your career. Earning your ISSAP is a deserving achievement that gives you a competitive advantage and makes you a member of an elite network of professionals worldwide.

Table of Contents

Access Control Systems & Methodology
Access Control Concepts
Authentication, Authorization, and Accounting (AAA)
Access Control Administration and Management Concepts
Communications & Network Security
Voice and Facsimile Communications
Network Architecture
Network Security Design Considerations
Interoperability and Associated Risks
Audits and Assessments
Operating Environment
Secure Sourcing Strategy
Cryptographic Principles
Applications of Cryptography
Vet Proprietary Cryptography & Design Testable Cryptographic Systems
Computational Overhead & Useful Life
Key Management
Key Life Cycle
Public Key Infrastructure
Design Validation
Security Architecture Analysis
Risk Analysis
Product Assurance Evaluation Criteria
Assurance through Evaluation
Architecture Frameworks
Design Process
Technology Related Business Continuity Planning (BCP) & Disaster Recovery Planning (DRP)
Planning Phases and Deliverables
Risk Analysis
Business Impact Analysis
Selecting a Recovery Strategy for Technology
Bringing It All Together – A Sample "Walk Through" of a DR Plan
Step by Step Guide for Disaster Recovery Planning for Security Architects
Physical Security Considerations
Physical Security Policies and Standards
Physical Security Risks
Protection Plans
Answers to Review Questions

View More


(ISC)2 is pleased to offer the Official (ISC) Guide to the ISSAP® CBK®, Second Edition. This book will review and deepen your knowledge of security architecture, covering each of the six domains contained in the CISSP-ISSAP® CBK®.
—W. Hord Tipton, CISSP-ISSAP, CAP, CISA, Executive Director (ISC)