Cargando…

CISSP : Certified Information Systems Security Professional study guide /

"Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% coverage of the CISSP Body of Knowledge exam objectives. Find clear and concise information on crucial security topics, practical examples and i...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Stewart, James Michael
Otros Autores: Tittel, Ed, Chapple, Mike
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco : SYBEX, ©2005.
Edición:3rd ed.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • Copyright
  • Dedication
  • Acknowledgments
  • About the Authors
  • Contents at a Glance
  • Contents
  • Introduction
  • Assessment Test
  • Answers to Assessment Test
  • Chapter 1: Accountability and Access Control
  • Access Control Overview
  • Identification and Authentication Techniques
  • Access Control Techniques
  • Access Control Methodologies and Implementation
  • Access Control Administration
  • Summary
  • Exam Essentials
  • Written Lab
  • Answers to Written Lab
  • Review Questions
  • Answers to Review Questions
  • Chapter 2: Attacks and Monitoring
  • Monitoring
  • Intrusion Detection
  • IDS-Related Tools
  • Penetration Testing
  • Methods of Attack
  • Access Control Compensations
  • Summary
  • Exam Essentials
  • Review Questions
  • Answers to Review Questions
  • Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure
  • OSI Model
  • Communications and Network Security
  • Internet/Intranet/Extranet Components
  • Remote Access Security Management
  • Network and Protocol Security Mechanisms
  • Avoiding Single Points of Failure
  • Summary
  • Exam Essentials
  • Written Lab
  • Answers to Written Lab
  • Review Questions
  • Answers to Review Questions
  • Chapter 4: Communications Security and Countermeasures
  • Virtual Private Network (VPN)
  • Network Address Translation
  • Switching Technologies
  • WAN Technologies
  • Miscellaneous Security Control Characteristics
  • Managing Email Security
  • Securing Voice Communications
  • Security Boundaries
  • Network Attacks and Countermeasures
  • Summary
  • Exam Essentials
  • Written Lab
  • Answers to Written Lab
  • Review Questions
  • Answers to Review Questions
  • Chapter 5: Security Management Concepts and Principles
  • Security Management Concepts and Principles
  • Protection Mechanisms
  • Change Control/Management
  • Data Classification
  • Planning to Plan
  • Summary
  • Exam Essentials
  • Written Lab
  • Answers to Written Lab
  • Review Questions
  • Answers to Review Questions
  • Chapter 6: Asset Value, Policies, and Roles
  • Employment Policies and Practices
  • Security Roles
  • Security Management Planning
  • Policies, Standards, Baselines, Guidelines, and Procedures
  • Risk Management
  • Security Awareness Training
  • Summary
  • Exam Essentials
  • Written Lab
  • Answers to Written Lab
  • Review Questions
  • Answers to Review Questions
  • Chapter 7: Data and Application Security Issues
  • Application Issues
  • Databases and Data Warehousing
  • Data/Information Storage
  • Knowledge-Based Systems
  • Systems Development Controls
  • Summary
  • Exam Essentials
  • Written Lab
  • Answers to Written Lab
  • Review Questions
  • Answers to Review Questions
  • Chapter 8: Malicious Code and Application Attacks
  • Malicious Code
  • Password Attacks
  • Denial-of-Service Attacks
  • Application Attacks
  • Web Application Security
  • Reconnaissance Attacks
  • Masquerading Attacks
  • Decoy Techniques
  • Summary
  • Exam Essentials
  • Written Lab
  • Answers to Written Lab
  • Review Questions
  • Answers to Review Questions
  • Chapter 9.