CISSP : Certified Information Systems Security Professional study guide /
"Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% coverage of the CISSP Body of Knowledge exam objectives. Find clear and concise information on crucial security topics, practical examples and i...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
San Francisco :
SYBEX,
©2005.
|
Edición: | 3rd ed. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Copyright
- Dedication
- Acknowledgments
- About the Authors
- Contents at a Glance
- Contents
- Introduction
- Assessment Test
- Answers to Assessment Test
- Chapter 1: Accountability and Access Control
- Access Control Overview
- Identification and Authentication Techniques
- Access Control Techniques
- Access Control Methodologies and Implementation
- Access Control Administration
- Summary
- Exam Essentials
- Written Lab
- Answers to Written Lab
- Review Questions
- Answers to Review Questions
- Chapter 2: Attacks and Monitoring
- Monitoring
- Intrusion Detection
- IDS-Related Tools
- Penetration Testing
- Methods of Attack
- Access Control Compensations
- Summary
- Exam Essentials
- Review Questions
- Answers to Review Questions
- Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure
- OSI Model
- Communications and Network Security
- Internet/Intranet/Extranet Components
- Remote Access Security Management
- Network and Protocol Security Mechanisms
- Avoiding Single Points of Failure
- Summary
- Exam Essentials
- Written Lab
- Answers to Written Lab
- Review Questions
- Answers to Review Questions
- Chapter 4: Communications Security and Countermeasures
- Virtual Private Network (VPN)
- Network Address Translation
- Switching Technologies
- WAN Technologies
- Miscellaneous Security Control Characteristics
- Managing Email Security
- Securing Voice Communications
- Security Boundaries
- Network Attacks and Countermeasures
- Summary
- Exam Essentials
- Written Lab
- Answers to Written Lab
- Review Questions
- Answers to Review Questions
- Chapter 5: Security Management Concepts and Principles
- Security Management Concepts and Principles
- Protection Mechanisms
- Change Control/Management
- Data Classification
- Planning to Plan
- Summary
- Exam Essentials
- Written Lab
- Answers to Written Lab
- Review Questions
- Answers to Review Questions
- Chapter 6: Asset Value, Policies, and Roles
- Employment Policies and Practices
- Security Roles
- Security Management Planning
- Policies, Standards, Baselines, Guidelines, and Procedures
- Risk Management
- Security Awareness Training
- Summary
- Exam Essentials
- Written Lab
- Answers to Written Lab
- Review Questions
- Answers to Review Questions
- Chapter 7: Data and Application Security Issues
- Application Issues
- Databases and Data Warehousing
- Data/Information Storage
- Knowledge-Based Systems
- Systems Development Controls
- Summary
- Exam Essentials
- Written Lab
- Answers to Written Lab
- Review Questions
- Answers to Review Questions
- Chapter 8: Malicious Code and Application Attacks
- Malicious Code
- Password Attacks
- Denial-of-Service Attacks
- Application Attacks
- Web Application Security
- Reconnaissance Attacks
- Masquerading Attacks
- Decoy Techniques
- Summary
- Exam Essentials
- Written Lab
- Answers to Written Lab
- Review Questions
- Answers to Review Questions
- Chapter 9.