CISSP CBK Suggested References URL: https://www.isc2.org/certifications/References • Access Control, Authentication, and Public Key Infrastructure (Information Systems Security & Assurance) 1st Edition by Bill Ballad, Tricia Ballad, Erin Banks Publisher: Jones & Bartlett Learning; edition (September 24, 2010) ISBN-13: 978-0763791285 • Applied Cryptography: Protocols, Algorithms, and Source Code in C by Schneier, Bruce Publisher: John Wiley & Sons (November 1, 1995) ISBN-13: 9780471117094 • Agile Development in the Real World 1st ed Edition by Alan Cline Publisher: Apress; 1st ed edition (December 19, 2015) ISBN-13: 9781484216781 • Building Secure Software: How to Avoid Security Problems the Right Way (paperback) (Addison-wesley Professional Computing Series) 1st Edition by John Viega, Gary McGraw Publisher: Addison-Wesley Professional; edition (October 4, 2001) ISBN-13: 978-0321774958 • Cloud Computing Bible 1st Edition by Barrie Sosinsky Publisher: Wiley; edition (January 11, 2011) ISBN-13: 978-0470903568 • Core Software Security: Security at the Source 1st Edition by James Ransome, Anmol Misra Publisher: Auerbach Publications; edition (December 9, 2013) ISBN-13: 978-1466560956 • Cryptography and Network Security: Principles and Practice (6th Edition) 6th Edition by William Stallings Publisher: Pearson; edition (March 16, 2013) ISBN-13: 978-0133354690 • Data Stewardship 1st Edition An Actionable Guide to Effective Data Management and Data Governance Write a review Authors: David Plotkin Paperback ISBN: 9780124103894 Imprint: Morgan Kaufmann Published Date: 26th September 2013 • Designing Network Security, 2nd Edition by Merike Kaeo Published Oct 30, 2003 by Cisco Press ISBN-13: 978-1-58705-117-3 • Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference 1st ed Edition by Jamie Watters and Janet Watters Publisher: Apress; 1st ed edition (December 23, 2013) ISBN-13: 978-1430264064 • Disaster Recovery Planning: Preparing for the Unthinkable (3rd Edition) 3rd Edition by Jon William Toigo Publisher: Prentice Hall; edition (September 6, 2002) ISBN-13: 9780130462824 • End-to-End Network Security: Defense-in-Depth 1st Edition by Omar Santos Publisher: Cisco Press; edition (September 3, 2007) ISBN-13: 9781587053320 • Federated Identity Primer 1st Edition by Derrick Rountree Publisher: Syngress; edition (December 24, 2012) ISBN-13: 9780124071896 • Handbook of Information Security, 3-Volume Set 1st Edition by Hossein Bidgoli (Editor) Publisher: Wiley; edition (December 30, 2005) ISBN-13: 9780471648338 • Handbook of Information Security Management 98th Edition by Harold F Tipton Publisher: Auerbach Publications; 98 edition (December 15, 1997) ISBN13: 978-0849399473 • Identity and Access Management: Business Performance Through Connected Intelligence 1st Edition by Ertem Osmanoglu Publisher: Syngress; edition (December 10, 2013) ISBN-13: 9780124081406 • Identity Management: A Business Perspective by Graham Williamson Publisher: Mc Press (February 20, 2017) ISBN-13: 978-1583474990 • Information Security Management Handbook, Fourth Edition, Volume II 1st Edition by Harold F Tipton (Editor) Publisher: Auerbach Publications; edition (October 20, 2000) ISBN-13: 978-0849308000 • Information Security Management Handbook, Volume 5th Edition by Harold F Tipton (Editor), Micki Krause (Editor) Publisher: Auerbach Publications; edition (December 28, 2004) ISBN-13: 978-0849332104 • Information Security Management Handbook, 6th Edition 6th Edition by Harold F Tipton, Micki Krause Publisher: CRC Press; edition (May 14, 2007) ISBN-13: 978-0849374951 • IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks by Naganand Doraswamy and Dan Harkins Publisher Prentice Hall Professional, 2003 ISBN 9780130461896 • (ISC)2 Code of Ethics • ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements 2013 ISO/IEC • Java Web Services: Up and Running, 2nd Edition A Quick, Practical, and Thorough Introduction by Martin Kalin Publisher: O'Reilly Media; edition (September 28, 2013) ISBN-13: 9781449365110 • Kali Linux – Assuring Security by Penetration Testing Kindle Edition by Lee Allen Tedi Heriyanto, Shakeel Ali Publisher: Packt Publishing (April 7, 2014) • Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals 1st Edition by Constantine Photopoulos Publisher: Syngress; edition (April 18, 2008) ISBN-13: 9781597492393 • Network Security Assessment, 3rd Edition Know Your Network by Chris McNab Publisher: O'Reilly Media Release Date: December 2016 • Network Security Assessment: From Vulnerability to Patch 1st Edition by Steve Manzuik, Andre Gold, Chris Gatford Publisher: Syngress; edition (November 7, 2006) ISBN-13: 978-1597491013 • NIST SP 800-37 Rev Guide for Applying the Risk Management Framework to Federal Information Systems Feb 2010 (updated 2014) Joint Task Force • NIST SP 800-41 Rev Guidelines on Firewalls and Firewall Policy by Karen Scarfone, Paul Hoffman September 2009 • NIST 800-64 Rev Security Considerations in the System Development Life Cycle by Richard Kissel, Kevin Stine, Matthew Scholl, Hart Rossman, Jim Fahlsing, Jessica Gulick October 2008 • NIST SP 800-100 Information Security Handbook: A Guide for Managers by Pauline Bowen, Joan Hash, Mark Wilson Oct 2006 • NIST SP 800-115 Technical Guide to Information Security Testing and Assessment by Karen Scarfone, Murugiah Souppaya, Amanda Cody, Angela Orebaugh September 2008 • NIST SP 800-137 Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations by Kelley Dempsey, Nirali Shah Chawla, Arnold Johnson, Ronald Johnston, Alicia Clay Jones, Angela Orebaugh, Matthew Scholl, Kevin Stine September 2011 • Official (ISC)2 Guide to the CISSP CBK / Edition by Steven Hernandez, CISSP Publisher: Auerbach Publications; edition (December 22, 2009) ISBN-13: 9781439809594 • Official (ISC)2 Guide to the CISSP CBK, Fourth Edition ((ISC)2 Press) 4th Edition by Adam Gordon (Editor) Publisher: Auerbach Publications; edition (March 11, 2015) ISBN13: 978-1482262759 • OWASP Application Security Verification Standard 3.0.1 July 2016 Lead author - Jim Manico • Real Digital Forensics: Computer Security and Incident Response by Keith J Jones, Richard Bejtlich, Curtis W Rose Publisher: Addison-Wesley Professional (October 3, 2005) ISBN-13: 978-0321240699 • Security in Computing [3rd Edition] by Pfleeger, Charles P., Pfleeger, Shari Lawrence [Prentice Hall PTR,2002] ASIN: B00DU78E9O • Security in Computing (5th Edition) by Charles P Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies Publisher: Prentice Hall; edition (February 5, 2015) ISBN-13: 978-0134085043 • Security Program and Policies: Principles and Practices (2nd Edition) (Certification/Training) 2nd Edition by Sari Greene Publisher: Pearson IT Certification; edition (March 29, 2014) ISBN-13: 9780789751676 • Software Engineering New ed Edition by Kassem A Saleh Publisher: J Ross Publishing; New ed edition (August 11, 2009) ISBN-13: 978-1932159943 • The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards 1st Edition by Courtney Bowman, Ari Gesher, John K Grant, Daniel Slate, and Elissa Lerner (Editor) Publisher: O'Reilly Media; edition (September 11, 2015) ISBN-13: 978-1491904015 • The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics 1st Edition by John Sammons Publisher: Syngress; edition (March 9, 2012) ISBN-13: 978-1597496612 • The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress)) 1st Edition by Stephen D Gantz Publisher: Syngress; edition (December 6, 2013) ISBN-13: 9780124171596 • The Complete Guide to Physical Security 1st Edition by Paul R Baker and Daniel J Benny Publisher: Auerbach Publications; edition (November 19, 2012) ISBN-13: 978-1420099638 • The InfoSec Handbook: An Introduction to Information Security 1st ed Edition by Umesha Nayak and Umesh R Hodeghatta Publisher: Apress; 1st ed edition (August 30, 2014) ISBN-13: 978-1430263821 • Threat Modeling: Designing for Security 1st Edition by Adam Shostack Publisher: Wiley; edition (February 17, 2014) ISBN-13: 978-1118809990 • Using the Common Criteria for IT Security Evaluation Debra S Herrmann December 27, 2002 by Auerbach Publications ISBN 9780849314049 • Wireless Security Merritt Maxim Publisher McGraw Hill Professional Apr 29, 2002 ISBN 9780072222869 ... Guide to the CISSP CBK / Edition by Steven Hernandez, CISSP Publisher: Auerbach Publications; edition (December 22, 2009) ISBN-13: 9781439809594 • Official (ISC)2 Guide to the CISSP CBK, Fourth