Home > General > Cissp (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Ed
31%
Cissp (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Ed

Cissp (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Ed

4.6       |  18 Reviews 
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition has been completely updated for the latest 2015 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions.

·Security Governance Through Principles and Policies
·Personnel Security and Risk Management Concepts
·Business Continuity Planning
·Laws, Regulations and Compliance
·Protecting Security of Assets
·Cryptography and Symmetric Key Algorithms
·PKI and Cryptographic Applications
·Principles of Security Models, Design and Capabilities
·Security Vulnerabilities, Threats and Countermeasures
·Physical Security Requirements
·Secure Network Architecture and Securing Network Components
·Secure Communications and Network Attacks
·Managing Identity and Authentication
·Controlling and Monitoring Access
·Security Assessment and Testing
·Managing Security Operations
·Preventing and Responding to Incidents
·Disaster Recovery Planning
·Incidents and Ethics
·Software Development Security
·Malicious Code and Application Attacks

About the Author

James Michael Stewart has been working with technology for nearly thirty years. His work focuses on security, certification and various operating systems. Recently, Michael has been teaching job skill and certification courses, such as CISSP, ethical hacking/penetration testing, computer forensics and Security+. Mike Chapple is Senior Director for IT Service Delivery at Notre Dame overseeing information security, data governance, IT architecture, project management, strategic planning and product management functions and teaches undergraduate courses on Information Security.  Mike spent 4 years in the information security research group at NSA and served as an  intelligence officer in the U.S. Air Force.  He is a technical editor for Information Security Magazine and has written several books. Darril Gibson is the CEO of YCDA, LLC and regularly writes and consults on a wide variety of technical and security topics and holds numerous certifications including MCSE, MCDBA, MCSD, MCITP, ITIL v3, Security+ and CISSP.



Table of Contents:
Introduction Assessment Test Chapter 1 Security Governance Through Principles and Policies ·Understand and Apply Concepts of Confidentiality, Integrity and Availability ·Confidentiality ·Integrity ·Availability ·Other Security Concepts ·Protection Mechanisms ·Layering ·Abstraction ·Data Hiding ·Encryption ·Apply Security Governance Principles ·Alignment of Security Function to Strategy, Goals, Mission and Objectives ·Organizational Processes ·Security Roles and Responsibilities ·Control Frameworks ·Due Care and Due Diligence ·Develop and Implement Documented Security Policy, Standards, Procedures and Guidelines ·Security Policies ·Security Standards, Baselines and Guidelines ·Security Procedures ·Understand and Apply Threat Modeling ·Identifying Threats ·Determining and Diagramming Potential Attacks ·Performing Reduction Analysis ·Prioritization and Response ·Integrate Security Risk Considerations into Acquisition Strategy and Practice ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 2 Personnel Security and Risk Management Concepts ·Contribute to Personnel Security Policies ·Employment Candidate Screening ·Employment Agreements and Policies ·Employment Termination Processes ·Vendor, Consultant and Contractor Controls ·Compliance ·Privacy ·Security Governance ·Understand and Apply Risk Management Concepts ·Risk Terminology ·Identify Threats and Vulnerabilities ·Risk Assessment / Analysis ·Risk Assignment / Acceptance ·Countermeasure Selection and Assessment ·Implementation ·Types of Controls ·Monitoring and Measurement ·Asset Valuation ·Continuous Improvement ·Risk Frameworks ·Establish and Manage Information Security Education, Training and Awareness ·Manage the Security Function ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 3 Business Continuity Planning ·Planning for Business Continuity ·Project Scope and Planning ·Business Organization Analysis ·BCP Team Selection ·Resource Requirements ·Legal and Regulatory Requirements ·Business Impact Assessment ·Identify Priorities ·Risk Identification ·Likelihood Assessment ·Impact Assessment ·Resource Prioritization ·Continuity Planning ·Strategy Development ·Provisions and Processes ·Plan Approval ·Plan Implementation ·Training and Education ·BCP Documentation ·Continuity Planning Goals ·Statement of Importance ·Statement of Priorities ·Statement of Organizational Responsibility ·Statement of Urgency and Timing ·Risk Assessment ·Risk Acceptance / Mitigation ·Vital Records Program ·Emergency-Response Guidelines ·Maintenance ·Testing and Exercises ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 4 Laws, Regulations and Compliance ·Categories of Laws ·Criminal Law ·Civil Law ·Administrative Law ·Laws ·Computer Crime ·Intellectual Property ·Licensing ·Import / Export ·Privacy ·Compliance ·Contracting and Procurement ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 5 Protecting Security of Assets ·Classifying and Labeling Assets ·Defining Sensitive Data ·Defining Classifications ·Defining Data Security Requirements ·Understanding Data States ·Managing Sensitive Data ·Protecting Confidentiality with Cryptography ·Identifying Data Roles ·Data Owners ·System Owners ·Business / Mission Owners ·Data Processors ·Administrators ·Custodians ·Users ·Protecting Privacy ·Using Security Baselines ·Scoping and Tailoring ·Selecting Standards ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 6 Cryptography and Symmetric Key Algorithms ·Historical Milestones in Cryptography ·Caesar Cipher ·American Civil War ·Ultra vs. Enigma ·Cryptographic Basics ·Goals of Cryptography ·Cryptography Concepts ·Cryptographic Mathematics ·Ciphers ·Modern Cryptography ·Cryptographic Keys ·Symmetric Key Algorithms ·Asymmetric Key Algorithms ·Hashing Algorithms ·Symmetric Cryptography ·Data Encryption Standard ·Triple DES ·International Data Encryption Algorithm ·Blowfish ·Skipjack ·Advanced Encryption Standard ·Symmetric Key Management ·Cryptographic Life Cycle ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 7 PKI and Cryptographic Applications ·Asymmetric Cryptography ·Public and Private Keys ·RSA ·El Gamal ·Elliptic Curve ·Hash Functions ·SHA ·MD2 ·MD4 ·MD5 ·Digital Signatures ·HMAC ·Digital Signature Standard ·Public Key Infrastructure ·Certificates ·Certificate Authorities ·Certificate Generation and Destruction ·Asymmetric Key Management ·Applied Cryptography ·Portable Devices ·Email ·Web Applications ·Digital Rights Management ·Networking ·Cryptographic Attacks ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 8 Principles of Security Models, Design and Capabilities ·Implement and Manage Engineering Processes Using Secure Design Principles ·Objects and Subjects ·Closed and Open Systems ·Techniques for Ensuring Confidentiality, Integrity and Availability ·Controls ·Trust and Assurance ·Understand the Fundamental Concepts of Security Models ·Trusted Computing Base ·State Machine Model ·Information Flow Model ·Noninterference Model ·Take-Grant Model ·Access Control Matrix ·Bell-LaPadula Model ·Biba Model ·Clark-Wilson Model ·Brewer and Nash Model (aka Chinese Wall) ·Goguen-Meseguer Model ·Sutherland Model ·Graham-Denning Model ·Select Controls and Countermeasures Based on Systems Security Evaluation Models ·Rainbow Series ·ITSEC Classes and Required Assurance and Functionality ·Common Criteria ·Industry and International Security Implementation Guidelines ·Certification and Accreditation ·Understand Security Capabilities of Information Systems ·Memory Protection ·Virtualization ·Trusted Platform Module ·Interfaces ·Fault Tolerance ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 9 Security Vulnerabilities, Threats and Countermeasures ·Assess and Mitigate Security Vulnerabilities ·Hardware ·Input / Output Structures ·Firmware ·Client-Based ·Applets ·Local Caches ·Server Based ·Database Security ·Aggregation ·Inference ·Data Mining and Data Warehousing ·Data Analytics ·Large-Scale Parallel Data Systems ·Distributed Systems ·Cloud Computing ·Grid Computing ·Peer to Peer ·Industrial Control Systems ·Assess and Mitigate Vulnerabilities in Web-Based Systems ·Assess and Mitigate Vulnerabilities in Mobile Systems ·Device Security ·Application Security ·BYOD Concerns ·Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber- Physical Systems ·Examples of Embedded and Static Systems ·Methods of Securing ·Essential Security Protection Mechanisms ·Technical Mechanisms ·Security Policy and Computer Architecture ·Policy Mechanisms ·Common Architecture Flaws and Security Issues ·Covert Channels ·Attacks Based on Design or Coding Flaws and Security Issues ·Programming ·Timing, State Changes and Communication Disconnects ·Technology and Process Integration ·Electromagnetic Radiation ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 10 Physical Security Requirements ·Apply Secure Principles to Site and Facility Design ·Secure Facility Plan ·Site Selection ·Visibility ·Natural Disasters ·Facility Design ·Design and Implement Physical Security ·Equipment Failure ·Wiring Closets ·Server Rooms ·Media Storage Facilities ·Evidence Storage ·Restricted and Work Area Security (e.g., Operations Centers) ·Datacenter Security ·Utilities and HVAC Considerations ·Water Issues (e.g., Leakage, Flooding) ·Fire Prevention, Detection and Suppression ·Implement and Manage Physical Security ·Perimeter (e.g., Access Control and Monitoring) ·Internal Security (e.g., Escort Requirements / Visitor Control, Keys and Locks) ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 11 Secure Network Architecture and Securing Network Components ·OSI Model ·History of the OSI Model ·OSI Functionality ·Encapsulation / Deencapsulation ·OSI Layers ·TCP/IP Model ·TCP/IP Protocol Suite Overview ·Converged Protocols ·Content Distribution Networks ·Wireless Networks ·Securing Wireless Access Points ·Securing the SSID ·Conducting a Site Survey ·Using Secure Encryption Protocols ·Determining Antenna Placement ·Antenna Types ·Adjusting Power Level Controls ·Using Captive Portals ·General Wi-Fi Security Procedure ·Secure Network Components ·Network Access Control ·Firewalls ·Endpoint Security ·Other Network Devices ·Cabling, Wireless, Topology and Communications Technology ·Network Cabling ·Network Topologies ·Wireless Communications and Security ·LAN Technologies ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 12 Secure Communications and Network Attacks ·Network and Protocol Security Mechanisms ·Secure Communications Protocols ·Authentication Protocols ·Secure Voice Communications ·Voice over Internet Protocol (VoIP) ·Social Engineering ·Fraud and Abuse ·Multimedia Collaboration ·Remote Meeting ·Instant Messaging ·Manage Email Security ·Email Security Goals ·Understand Email Security Issues ·Email Security Solutions ·Remote Access Security Management ·Plan Remote Access Security ·Dial-Up Protocols ·Centralized Remote Authentication Services ·Virtual Private Network ·Tunneling ·How VPNs Work ·Common VPN Protocols ·Virtual LAN ·Virtualization ·Virtual Software ·Virtual Networking ·Network Address Translation ·Private IP Addresses ·Stateful NAT ·Static and Dynamic NAT ·Automatic Private IP Addressing ·Switching Technologies ·Circuit Switching ·Packet Switching ·Virtual Circuits ·WAN Technologies ·WAN Connection Technologies ·Dial-Up Encapsulation Protocols ·Miscellaneous Security Control Characteristics ·Transparency ·Verify Integrity ·Transmission Mechanisms ·Security Boundaries ·Prevent or Mitigate Network Attacks ·DoS and DDoS ·Eavesdropping ·Impersonation / Masquerading ·Replay Attacks ·Modification Attacks ·Address Resolution Protocol Spoofing ·DNS Poisoning, Spoofing and Hijacking ·Hyperlink Spoofing ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 13 Managing Identity and Authentication ·Controlling Access to Assets ·Comparing Subjects and Objects ·Types of Access Control ·The CIA Triad ·Comparing Identification and Authentication ·Registration and Proofing of Identity ·Authorization and Accountability ·Authentication Factors ·Passwords ·Smartcards and Tokens ·Biometrics ·Multifactor Authentication ·Device Authentication ·Implementing Identity Management ·Single Sign-On ·Credential Management Systems ·Integrating Identity Services ·Managing Sessions ·AAA Protocols ·Managing the Identity and Access Provisioning Life Cycle ·Provisioning ·Account Review ·Account Revocation ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 14 Controlling and Monitoring Access ·Comparing Access Control Models ·Comparing Permissions, Rights and Privileges ·Understanding Authorization Mechanisms ·Defining Requirements with a Security Policy ·Implementing Defense in Depth ·Discretionary Access Controls ·Nondiscretionary Access Controls ·Understanding Access Control Attacks ·Risk Elements ·Identifying Assets ·Identifying Threats ·Identifying Vulnerabilities ·Common Access Control Attacks ·Summary of Protection Methods ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 15 Security Assessment and Testing ·Building a Security Assessment and Testing Program ·Security Testing ·Security Assessments ·Security Audits ·Performing Vulnerability Assessments ·Vulnerability Scans ·Penetration Testing ·Testing Your Software ·Code Review and Testing ·Interface Testing ·Misuse Case Testing ·Test Coverage Analysis ·Implementing Security Management Processes ·Log Reviews ·Account Management ·Backup Verification ·Key Performance and Risk Indicators ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 16 Managing Security Operations ·Applying Security Operations Concepts ·Need to Know and Least Privilege ·Separation of Duties and Responsibilities ·Job Rotation ·Mandatory Vacations ·Monitor Special Privileges ·Managing the Information Life Cycle ·Service Level Agreements ·Addressing Personnel Safety ·Provisioning and Managing Resources ·Managing Hardware and Software Assets ·Protecting Physical Assets ·Managing Virtual Assets ·Managing Cloud-based Assets ·Media Management ·Managing Configuration ·Baselining ·Using Images for Baselining ·Managing Change ·Security Impact Analysis ·Versioning ·Configuration Documentation ·Managing Patches and Reducing Vulnerabilities ·Patch Management ·Vulnerability Management ·Common Vulnerabilities and Exposures ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 17 Preventing and Responding to Incidents ·Managing Incident Response ·Defining an Incident ·Incident Response Steps ·Implementing Preventive Measures ·Basic Preventive Measures ·Understanding Attacks ·Intrusion Detection and Prevention Systems ·Specific Preventive Measures ·Logging, Monitoring and Auditing ·Logging and Monitoring ·Egress Monitoring ·Auditing to Assess Effectiveness ·Security Audits and Reviews ·Reporting Audit Results ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 18 Disaster Recovery Planning ·The Nature of Disaster ·Natural Disasters ·Man-made Disasters ·Understand System Resilience and Fault Tolerance ·Protecting Hard Drives ·Protecting Servers ·Protecting Power Sources ·Trusted Recovery ·Quality of Service ·Recovery Strategy ·Business Unit and Functional Priorities ·Crisis Management ·Emergency Communications ·Workgroup Recovery ·Alternate Processing Sites ·Mutual Assistance Agreements ·Database Recovery ·Recovery Plan Development ·Emergency Response ·Personnel and Communications ·Assessment ·Backups and Offsite Storage ·Software Escrow Arrangements ·External Communications ·Utilities ·Logistics and Supplies ·Recovery vs. Restoration ·Training, Awareness and Documentation ·Testing and Maintenance ·Read-Through Test ·Structured Walk-Through ·Simulation Test ·Parallel Test ·Full-Interruption Test ·Maintenance ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 19 Incidents and Ethics ·Investigations ·Investigation Types ·Evidence ·Investigation Process ·Major Categories of Computer Crime ·Military and Intelligence Attacks ·Business Attacks ·Financial Attacks ·Terrorist Attacks ·Grudge Attacks ·Thrill Attacks ·Incident Handling ·Common Types of Incidents ·Response Teams ·Incident Response Process ·Interviewing Individuals ·Incident Data Integrity and Retention ·Reporting and Documenting Incidents ·Ethics ·(ISC)2 Code of Ethics ·Ethics and the Internet ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 20 Software Development Security ·Introducing Systems Development Controls ·Software Development ·Systems Development Life Cycle ·Life Cycle Models ·Gantt Charts and PERT ·Change and Configuration Management ·The DevOps Approach ·Application Programming Interfaces ·Software Testing ·Code Repositories ·Service-Level Agreements ·Software Acquisition ·Establishing Databases and Data Warehousing ·Database Management System Architecture ·Database Transactions ·Security for Multilevel Databases ·ODBC ·Storing Data and Information ·Types of Storage ·Storage Threats ·Understanding Knowledge-based Systems ·Expert Systems ·Neural Networks ·Decision Support Systems ·Security Applications ·Summary ·Exam Essentials ·Written Lab ·Review Questions Chapter 21 Malicious Code and Application Attacks ·Malicious Code ·Sources of Malicious Code ·Viruses ·Logic Bombs ·Trojan Horses ·Worms ·Spyware and Adware ·Countermeasures ·Password Attacks ·Password Guessing ·Dictionary Attacks ·Social Engineering ·Countermeasures ·Application Attacks ·Buffer Overflows ·Time of Check to Time of Use ·Back Doors ·Escalation of Privilege and Rootkits ·Web Application Security ·Cross-Site Scripting (XSS) ·SQL Injection ·Reconnaissance Attacks ·IP Probes ·Port Scans ·Vulnerability Scans ·Dumpster Diving ·Masquerading Attacks ·IP Spoofing ·Session Hijacking ·Summary ·Exam Essentials ·Written Lab ·Review Questions Appendix A Answers to Review Questions Chapter 1: Security Governance Through Principles and Policies Chapter 2: Personnel Security and Risk Management Concepts Chapter 3: Business Continuity Planning Chapter 4: Laws, Regulations and Compliance Chapter 5: Protecting Security of Assets Chapter 6: Cryptography and Symmetric Key Algorithms Chapter 7: PKI and Cryptographic Applications Chapter 8: Principles of Security Models, Design and Capabilities Chapter 9: Security Vulnerabilities, Threats and Countermeasures Chapter 10: Physical Security Requirements Chapter 11: Secure Network Architecture and Securing Network Components Chapter 12: Secure Communications and Network Attacks Chapter 13: Managing Identity and Authentication Chapter 14: Controlling and Monitoring Access Chapter 15: Security Assessment and Testing Chapter 16: Managing Security Operations Chapter 17: Preventing and Responding to Incidents Chapter 18: Disaster Recovery Planning Chapter 19: Incidents and Ethics Chapter 20: Software Development Security Chapter 21: Malicious Code and Application Attacks Appendix B Answers to Written Labs Chapter 1: Security Governance Through Principles and Policies Chapter 2: Personnel Security and Risk Management Concepts Chapter 3: Business Continuity Planning Chapter 4: Laws, Regulations and Compliance Chapter 5: Protecting Security of Assets Chapter 6: Cryptography and Symmetric Key Algorithms Chapter 7: PKI and Cryptographic Applications Chapter 8: Principles of Security Models, Design and Capabilities Chapter 9: Security Vulnerabilities, Threats and Countermeasures Chapter 10: Physical Security Requirements Chapter 11: Secure Network Architecture and Securing Network Components Chapter 12: Secure Communications and Network Attacks Chapter 13: Managing Identity and Authentication Chapter 14: Controlling and Monitoring Access Chapter 15: Security Assessment and Testing Chapter 16: Managing Security Operations Chapter 17: Preventing and Responding to Incidents Chapter 18: Disaster Recovery Planning Chapter 19: Incidents and Ethics Chapter 20: Software Development Security Chapter 21: Malicious Code and Application Attacks Appendix C About the Additional Study Tools Additional Study Tools Sybex Test Engine Electronic Flashcards PDF of Glossary of Terms Adobe Reader System Requirements Using the Study Tools Troubleshooting Customer Care Index


Best Sellers



Product Details
  • ISBN-13: 9788126558339
  • Publisher: Wiley India Pvt Ltd
  • Binding: Paperback
  • No of Pages: 1076
  • ISBN-10: 8126558334
  • Publisher Date: October'2015
  • Language: English

Related Categories

Similar Products

Add Photo
Add Photo

Customer Reviews

4.6       |  18 Reviews 
out of (%) reviewers recommend this product
Top Reviews
Rating Snapshot
Select a row below to filter reviews.
5
4
3
2
1
Average Customer Ratings
4.6       |  18 Reviews 
00 of 0 Reviews
Sort by :
Active Filters

00 of 0 Reviews
SEARCH RESULTS
1–2 of 2 Reviews
    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!

    BoxerLover2 - 5 Days ago
    A Thrilling But Totally Believable Murder Mystery

    Read this in one evening. I had planned to do other things with my day, but it was impossible to put down. Every time I tried, I was drawn back to it in less than 5 minutes. I sobbed my eyes out the entire last 100 pages. Highly recommend!


Sample text
Photo of
    Media Viewer

    Sample text
    Reviews
    Reader Type:
    BoxerLover2
    00 of 0 review

    Your review was submitted!
    Cissp (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Ed
    Wiley India Pvt Ltd -
    Cissp (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Ed
    Writing guidlines
    We want to publish your review, so please:
    • keep your review on the product. Review's that defame author's character will be rejected.
    • Keep your review focused on the product.
    • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
    • Refrain from mentioning competitors or the specific price you paid for the product.
    • Do not include any personally identifiable information, such as full names.

    Cissp (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Ed

    Required fields are marked with *

    Review Title*
    Review
      Add Photo Add up to 6 photos
      Would you recommend this product to a friend?
      Tag this Book
      Read more
      Does your review contain spoilers?
      What type of reader best describes you?
      I agree to the terms & conditions
      You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

      CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

      These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


      By submitting any content to Bookswagon, you guarantee that:
      • You are the sole author and owner of the intellectual property rights in the content;
      • All "moral rights" that you may have in such content have been voluntarily waived by you;
      • All content that you post is accurate;
      • You are at least 13 years old;
      • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
      You further agree that you may not submit any content:
      • That is known by you to be false, inaccurate or misleading;
      • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
      • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
      • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
      • For which you were compensated or granted any consideration by any unapproved third party;
      • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
      • That contains any computer viruses, worms or other potentially damaging computer programs or files.
      You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


      For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


      All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

      Accept

      New Arrivals



      Inspired by your browsing history


      Your review has been submitted!

      You've already reviewed this product!