Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
251
11
On e Pr O f e s s i O n a l
ac c r e d i t a t i O n Pr O g r a m
t O Bi n d th e m al l
I believe issues with the current framework of accreditation are rela-
tively well known and well documented, which is why, thus far, I have
not covered this topic in any great depth. In Chapter 6, I briey cov-
ered the (ISC)
2
Certied Information Systems Security Professional
(CISSP) accreditation because at the time of writing, it is the most
widely accepted/recognized accreditation in security.
In information security, we do seem to have lost our way some-
what with accreditation, so it seems apt to bring some sobriety back to
the situation and remind ourselves of the basic tenets of professional
accreditation. Professional certications f
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355