|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBOOKCENTRAL_ocn567966519 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
050616s2005 caua o 001 0 eng d |
010 |
|
|
|a 2005929270
|
040 |
|
|
|a CCO
|b eng
|e pn
|c CCO
|d E7B
|d OCLCQ
|d COCUF
|d COO
|d B24X7
|d FVL
|d OCLCQ
|d MUU
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCQ
|d AZK
|d LOA
|d CNNOR
|d MOR
|d PIFBR
|d OCLCQ
|d U3W
|d OCLCA
|d BRL
|d STF
|d WRM
|d NRAMU
|d INT
|d VT2
|d OCLCQ
|d WYU
|d A6Q
|d OCLCQ
|d UWK
|d UKCRE
|d BRF
|d EYM
|d OCLCQ
|d OCLCO
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 182529956
|a 183266656
|a 606037153
|a 647633507
|a 722522397
|a 728027558
|a 888562217
|a 961520176
|a 962663350
|a 968258271
|a 988478256
|a 992031834
|a 1037505119
|a 1037752559
|a 1038619843
|a 1045518005
|a 1055317060
|a 1060198288
|a 1062978313
|a 1076300706
|a 1081235488
|a 1110421266
|a 1153515465
|a 1179698003
|a 1194772373
|a 1228616338
|a 1240523255
|a 1249250409
|a 1262683121
|a 1272921736
|
020 |
|
|
|a 9780782144437
|
020 |
|
|
|a 0782144438
|
020 |
|
|
|a 1280287047
|
020 |
|
|
|a 9781280287046
|
020 |
|
|
|a 9786610287048
|
020 |
|
|
|a 661028704X
|
020 |
|
|
|a 0471779814
|
020 |
|
|
|a 9780471779810
|
020 |
|
|
|z 0782144438
|
029 |
1 |
|
|a AU@
|b 000053234275
|
029 |
1 |
|
|a AU@
|b 000057122709
|
029 |
1 |
|
|a NZ1
|b 12048772
|
035 |
|
|
|a (OCoLC)567966519
|z (OCoLC)182529956
|z (OCoLC)183266656
|z (OCoLC)606037153
|z (OCoLC)647633507
|z (OCoLC)722522397
|z (OCoLC)728027558
|z (OCoLC)888562217
|z (OCoLC)961520176
|z (OCoLC)962663350
|z (OCoLC)968258271
|z (OCoLC)988478256
|z (OCoLC)992031834
|z (OCoLC)1037505119
|z (OCoLC)1037752559
|z (OCoLC)1038619843
|z (OCoLC)1045518005
|z (OCoLC)1055317060
|z (OCoLC)1060198288
|z (OCoLC)1062978313
|z (OCoLC)1076300706
|z (OCoLC)1081235488
|z (OCoLC)1110421266
|z (OCoLC)1153515465
|z (OCoLC)1179698003
|z (OCoLC)1194772373
|z (OCoLC)1228616338
|z (OCoLC)1240523255
|z (OCoLC)1249250409
|z (OCoLC)1262683121
|z (OCoLC)1272921736
|
037 |
|
|
|a itpro
|
050 |
|
4 |
|a QA76.3
|b .T5735 2005eb
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Stewart, James Michael.
|
245 |
1 |
0 |
|a CISSP :
|b Certified Information Systems Security Professional study guide /
|c James Michael Stewart, Ed Tittel, Mike Chapple.
|
250 |
|
|
|a 3rd ed.
|
260 |
|
|
|a San Francisco :
|b SYBEX,
|c ©2005.
|
300 |
|
|
|a 1 online resource (759 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover -- Copyright -- Dedication -- Acknowledgments -- About the Authors -- Contents at a Glance -- Contents -- Introduction -- Assessment Test -- Answers to Assessment Test -- Chapter 1: Accountability and Access Control -- Access Control Overview -- Identification and Authentication Techniques -- Access Control Techniques -- Access Control Methodologies and Implementation -- Access Control Administration -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 2: Attacks and Monitoring -- Monitoring -- Intrusion Detection -- IDS-Related Tools -- Penetration Testing -- Methods of Attack -- Access Control Compensations -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure -- OSI Model -- Communications and Network Security -- Internet/Intranet/Extranet Components -- Remote Access Security Management -- Network and Protocol Security Mechanisms -- Avoiding Single Points of Failure -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 4: Communications Security and Countermeasures -- Virtual Private Network (VPN) -- Network Address Translation -- Switching Technologies -- WAN Technologies -- Miscellaneous Security Control Characteristics -- Managing Email Security -- Securing Voice Communications -- Security Boundaries -- Network Attacks and Countermeasures -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 5: Security Management Concepts and Principles -- Security Management Concepts and Principles -- Protection Mechanisms -- Change Control/Management -- Data Classification -- Planning to Plan -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 6: Asset Value, Policies, and Roles -- Employment Policies and Practices -- Security Roles -- Security Management Planning -- Policies, Standards, Baselines, Guidelines, and Procedures -- Risk Management -- Security Awareness Training -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 7: Data and Application Security Issues -- Application Issues -- Databases and Data Warehousing -- Data/Information Storage -- Knowledge-Based Systems -- Systems Development Controls -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 8: Malicious Code and Application Attacks -- Malicious Code -- Password Attacks -- Denial-of-Service Attacks -- Application Attacks -- Web Application Security -- Reconnaissance Attacks -- Masquerading Attacks -- Decoy Techniques -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 9.
|
520 |
|
|
|a "Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% coverage of the CISSP Body of Knowledge exam objectives. Find clear and concise information on crucial security topics, practical examples and insights drawn from real-world experience, and cutting-edge exam preparation software, including two full-length bonus exams and electronic flashcards. Prepare yourself by reviewing the key exam topics, including access control, application security, business continuity and disaster recovery planning, cryptography; information security and risk management, and security architecture and design telecommunications and network security"--Resource description page
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification.
|
650 |
|
0 |
|a Computer networks
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Examens
|v Guides de l'étudiant.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer networks
|x Examinations
|2 fast
|
650 |
|
7 |
|a Computer security
|x Examinations
|2 fast
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification
|2 fast
|
655 |
|
4 |
|a Computer network resources.
|
655 |
|
7 |
|a Study guides
|2 fast
|
700 |
1 |
|
|a Tittel, Ed.
|
700 |
1 |
|
|a Chapple, Mike.
|
700 |
1 |
|
|a Tittel, Ed.
|t CISSP.
|
758 |
|
|
|i has work:
|a (ISC)² CISSP certified information systems security professional (Work)
|1 https://id.oclc.org/worldcat/entity/E39PCFxvp4MqCtYGtHYdFDvd8K
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Stewart, James Michael.
|t CISSP.
|b 3rd ed.
|d San Francisco : SYBEX, ©2005
|w (DLC) 2005929270
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=242887
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH3960971
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00018444
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10152542
|
994 |
|
|
|a 92
|b IZTAP
|