PRODUCT SUPPORT ANNOUNCEMENT
See the latest about COVID-19 shipping availability and video/Web Edition load errors. Learn more.
This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
This chapter introduces the trusted computer base and the ways in which systems can be evaluated to assess the level of security to help you prepare for the CISSP exam.
Tim Warner introduces the CISSP Video Mentor computer-based training (CBT) product, authored by the legendary information security trainer and consultant Shon Harris.
Ed Tittel compares some of the most popular security certifications.