Problem solve Get help with specific problems with your technologies, process and projects.

Reading list for studying for the CISSP

Do you have, or know where I could locate, an educational track of sorts, or a syllabus, to guide me in my pursuit of a security certification?
Here's a reading list I pulled together for the CISSP:
  • CISSP Examination Textbooks: Theory and Practice, 2nd Ed., SRV Professional Publications
  • Secured Computing: A Cissp Study Guide, Carl F. Endorf
  • The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, Ronald L. Krutz, Russell Dean Vines, Edward M. Stroz
  • All-in-One CISSP Exam Guide, Shon Harris
  • Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd Ed., Bruce Schneier
  • Secrets and Lies: Digital Security in a Networked World, Bruce Schneier
  • The Process of Network Security, Thomas A. Wadlow
  • Kerberos: A Network Authentication System, Brian Tung
  • Practical Intrusion Detection Handbook, Paul E. Proctor
  • Network Intrusion Detection: An Analyst's Handbook, Stephen Northcutt, et al
  • Intrusion Signatures and Analysis, Mark Cooper, Stephen Northcutt, Matt Fearnow, Karen Frederick
  • Intrusion Detection, Rebecca Gurley Bace
  • Security, ID Systems and Locks: The Book on Electronic Access Control, Joel Konicek, Karen Little
  • Building Internet Firewalls, 2nd Ed., Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman, Deborah Russell
  • The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program, Gerald Kovacich
  • Fighting Computer Crime: A New Framework for Protecting Information, Donn B. Parker
  • ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache and Privacy Regulations, Timothy D. Casey
  • Information Security Policies Made Easy (Version #8), Charles Cresson Wood
  • Practical Unix and Internet Security, Simson Garfinkel, Gene Spafford
  • Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
  • Information Security Management Handbook 2001, Harold F. Tipton (Editor), Micki Krause (Editor)
  • The CERT(R) Guide to System and Network Security Practices, Julia H. Allen
  • Incident Response: Investigating Computer Crime, Chris Prosise, Kevin Mandia
  • Computer Forensics, Warren G. Kruse II, Jay G. Heiser
  • Know Your Enemy: Revealing the Security Tools, Tactics and Motives of the Blackhat Community, The Honeynet Project, Bruce Schneier
  • Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Ed Skoudis
  • Hack Attacks Encyclopedia: A Complete History of Hacks, Cracks, Phreaks and Spies over Time, John Chirillo
  • Hack Attacks Denied: Complete Guide to Network LockDown, John Chirillo
  • Hack Attacks Revealed: A Complete Reference with Custom Security Hacking Toolkit, John Chirillo
  • Hacker's Challenge, Mike Schiffman
  • Hackers Beware, Eric Cole
  • White-Hat Security Arsenal: Tackling the Threats, Aviel D. Rubin
  • Handbook of Computer Crime Investigation: Forensic Tools & Technology, Eoghan Casey
  • Cyber Forensics: A Field Manual for Collecting, Examining and Preserving Evidence of Computer Crimes, Albert J. Marcella Jr (Editor), Robert S. Greenfield
  • Information Security Policies, Procedures and Standards: Guidelines for Effective Information Security Management, Thomas R. Peltier
  • Writing Information Security Policies, Scott Barman
  • Building an Information Security Awareness Program, Mark B. Desman
  • Information Security Architecture: An Integrated Approach to Security in the Organization, Jan Killmeyer Tudor
  • Information Security Risk Analysis, Thomas R. Peltier
  • Rethinking Public Key Infrastructures and Digital Certificates, Stefan A. Brands
  • Intrusion Signatures and Analysis, Mark Cooper, Stephen Northcutt, Matt Fearnow, Karen Frederick
  • Hacking Exposed, 3rd Ed., Joel Scambray, et al

  • This was last published in March 2002

    Dig Deeper on Information security policies, procedures and guidelines

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.