Problem solve Get help with specific problems with your technologies, process and projects.

Reading list for studying for the CISSP

Do you have, or know where I could locate, an educational track of sorts, or a syllabus, to guide me in my pursuit of a security certification?
Here's a reading list I pulled together for the CISSP:
  • CISSP Examination Textbooks: Theory and Practice, 2nd Ed., SRV Professional Publications
  • Secured Computing: A Cissp Study Guide, Carl F. Endorf
  • The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, Ronald L. Krutz, Russell Dean Vines, Edward M. Stroz
  • All-in-One CISSP Exam Guide, Shon Harris
  • Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd Ed., Bruce Schneier
  • Secrets and Lies: Digital Security in a Networked World, Bruce Schneier
  • The Process of Network Security, Thomas A. Wadlow
  • Kerberos: A Network Authentication System, Brian Tung
  • Practical Intrusion Detection Handbook, Paul E. Proctor
  • Network Intrusion Detection: An Analyst's Handbook, Stephen Northcutt, et al
  • Intrusion Signatures and Analysis, Mark Cooper, Stephen Northcutt, Matt Fearnow, Karen Frederick
  • Intrusion Detection, Rebecca Gurley Bace
  • Security, ID Systems and Locks: The Book on Electronic Access Control, Joel Konicek, Karen Little
  • Building Internet Firewalls, 2nd Ed., Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman, Deborah Russell
  • The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Gerald Kovacich
  • Fighting Computer Crime: A New Framework for Protecting Information, Donn B. Parker
  • ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache and Privacy Regulations, Timothy D. Casey
  • Information Security Policies Made Easy (Version #8), Charles Cresson Wood
  • Practical Unix and Internet Security, Simson Garfinkel, Gene Spafford
  • Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
  • Information Security Management Handbook 2001, Harold F. Tipton (Editor), Micki Krause (Editor)
  • The CERT(R) Guide to System and Network Security Practices, Julia H. Allen
  • Incident Response: Investigating Computer Crime, Chris Prosise, Kevin Mandia
  • Computer Forensics, Warren G. Kruse II, Jay G. Heiser
  • Know Your Enemy: Revealing the Security Tools, Tactics and Motives of the Blackhat Community, The Honeynet Project, Bruce Schneier
  • Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Ed Skoudis
  • Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks and Spies over Time, John Chirillo
  • Hack Attacks Denied: Complete Guide to Network LockDown, John Chirillo
  • Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit, John Chirillo
  • Hacker's Challenge, Mike Schiffman
  • Hackers Beware, Eric Cole
  • White-Hat Security Arsenal: Tackling the Threats, Aviel D. Rubin
  • Handbook of Computer Crime Investigation: Forensic Tools & Technology, Eoghan Casey
  • Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes, Albert J. Marcella Jr (Editor), Robert S. Greenfield
  • Information Security Policies, Procedures and Standards: Guidelines for Effective Information Security Management, Thomas R. Peltier
  • Writing Information Security Policies, Scott Barman
  • Building an Information Security Awareness Program, Mark B. Desman
  • Information Security Architecture: An Integrated Approach to Security in the Organization, Jan Killmeyer Tudor
  • Information Security Risk Analysis, Thomas R. Peltier
  • Rethinking Public Key Infrastructures and Digital Certificates, Stefan A. Brands
  • Intrusion Signatures and Analysis, Mark Cooper, Stephen Northcutt, Matt Fearnow, Karen Frederick
  • Hacking Exposed, 3rd Ed., Joel Scambray, et al

  • This was last published in March 2002

    Dig Deeper on Information security policies, procedures and guidelines

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    Start the conversation

    Send me notifications when other members comment.

    Please create a username to comment.