Cargando…

CISSP : Certified Information systems Security Professional ; study guide /

"Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% coverage of the CISSP Body of Knowledge exam objectives. Find clear and concise information on crucial security topics, practical examples and i...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Stewart, James Michael
Otros Autores: Tittel, Ed, Chapple, Mike
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Wiley Pub., 2008.
Edición:4th ed.
Colección:Serious skills.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_ocn611581006
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 080522s2008 inu o 001 0 eng d
040 |a CNCGM  |b eng  |e pn  |c CNCGM  |d E7B  |d OCLCQ  |d CDX  |d CDN  |d TEFOD  |d IDEBK  |d UMI  |d CEF  |d OCLCQ  |d N$T  |d FVL  |d OCLCQ  |d DEBSZ  |d YUS  |d B24X7  |d OCLCQ  |d EBLCP  |d OCLCO  |d OCLCQ  |d OCLCF  |d UKDOC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d YDXCP  |d TEFOD  |d OCLCQ  |d OCLCO  |d COO  |d OCLCO  |d OCLCQ  |d OCLCO  |d AZK  |d CNNLC  |d OCLCO  |d CNNOR  |d PIFAG  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d STF  |d BRL  |d WRM  |d NRAMU  |d ICG  |d OCLCA  |d INT  |d VT2  |d AU@  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d DKC  |d OCLCQ  |d BRF  |d UKAHL  |d EYM  |d INARC  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 245543069  |a 263493280  |a 270606524  |a 297024344  |a 614432867  |a 646761922  |a 712979967  |a 722684932  |a 728038215  |a 961531969  |a 962629906  |a 1037464214  |a 1058071009  |a 1060196964  |a 1179554716  |a 1194806356 
020 |a 9780470276884  |q (paper/cd-rom) 
020 |a 0470276886  |q (paper/cd-rom) 
020 |a 9780470395912  |q (electronic bk. ;  |q Adobe Reader) 
020 |a 0470395915  |q (electronic bk. ;  |q Adobe Reader) 
029 1 |a AU@  |b 000053251714 
029 1 |a CDX  |b 8860957 
029 1 |a DEBBG  |b BV044130241 
029 1 |a DEBSZ  |b 355413175 
029 1 |a DEBSZ  |b 396179924 
029 1 |a HEBIS  |b 291485391 
029 1 |a NZ1  |b 13340826 
035 |a (OCoLC)611581006  |z (OCoLC)245543069  |z (OCoLC)263493280  |z (OCoLC)270606524  |z (OCoLC)297024344  |z (OCoLC)614432867  |z (OCoLC)646761922  |z (OCoLC)712979967  |z (OCoLC)722684932  |z (OCoLC)728038215  |z (OCoLC)961531969  |z (OCoLC)962629906  |z (OCoLC)1037464214  |z (OCoLC)1058071009  |z (OCoLC)1060196964  |z (OCoLC)1179554716  |z (OCoLC)1194806356 
037 |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 35F54A86-53B3-4806-97C9-1C7CE4884EFC  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.3  |b .T5735 2008eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Stewart, James Michael. 
245 1 0 |a CISSP :  |b Certified Information systems Security Professional ; study guide /  |c James Michael Stewart, Ed Tittel, Mike Chapple. 
250 |a 4th ed. 
260 |a Indianapolis, Ind. :  |b Wiley Pub.,  |c 2008. 
300 |a 1 online resource (xliv, 841 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
490 1 |a Sybex serious skills 
505 0 |a Cover -- Copyright -- Dedication -- Acknowledgments -- About the Authors -- Contents at a Glance -- Contents -- Introduction -- Assessment Test -- Answers to Assessment Test -- Chapter 1: Accountability and Access Control -- Access Control Overview -- Identification and Authentication Techniques -- Access Control Techniques -- Access Control Methodologies and Implementation -- Access Control Administration -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 2: Attacks and Monitoring -- Monitoring -- Intrusion Detection -- IDS-Related Tools -- Penetration Testing -- Methods of Attack -- Access Control Compensations -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure -- OSI Model -- Communications and Network Security -- Internet/Intranet/Extranet Components -- Remote Access Security Management -- Network and Protocol Security Mechanisms -- Avoiding Single Points of Failure -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 4: Communications Security and Countermeasures -- Virtual Private Network (VPN) -- Network Address Translation -- Switching Technologies -- WAN Technologies -- Miscellaneous Security Control Characteristics -- Managing Email Security -- Securing Voice Communications -- Security Boundaries -- Network Attacks and Countermeasures -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 5: Security Management Concepts and Principles -- Security Management Concepts and Principles -- Protection Mechanisms -- Change Control/Management -- Data Classification -- Planning to Plan -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 6: Asset Value, Policies, and Roles -- Employment Policies and Practices -- Security Roles -- Security Management Planning -- Policies, Standards, Baselines, Guidelines, and Procedures -- Risk Management -- Security Awareness Training -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 7: Data and Application Security Issues -- Application Issues -- Databases and Data Warehousing -- Data/Information Storage -- Knowledge-Based Systems -- Systems Development Controls -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 8: Malicious Code and Application Attacks -- Malicious Code -- Password Attacks -- Denial-of-Service Attacks -- Application Attacks -- Web Application Security -- Reconnaissance Attacks -- Masquerading Attacks -- Decoy Techniques -- Summary -- Exam Essentials -- Written Lab -- Answers to Written Lab -- Review Questions -- Answers to Review Questions -- Chapter 9. 
520 |a "Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% coverage of the CISSP Body of Knowledge exam objectives. Find clear and concise information on crucial security topics, practical examples and insights drawn from real-world experience, and cutting-edge exam preparation software, including two full-length bonus exams and electronic flashcards. Prepare yourself by reviewing the key exam topics, including access control, application security, business continuity and disaster recovery planning, cryptography; information security and risk management, and security architecture and design telecommunications and network security"--Resource description page. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Electronic data processing personnel  |x Certification. 
650 0 |a Computer networks  |x Examinations  |v Study guides. 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 6 |a Réseaux d'ordinateurs  |x Examens  |v Guides de l'étudiant. 
650 6 |a Sécurité informatique  |x Examens  |v Guides de l'étudiant. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Examinations  |2 fast 
650 7 |a Computer security  |x Examinations  |2 fast 
650 7 |a Electronic data processing personnel  |x Certification  |2 fast 
655 7 |a Study guides  |2 fast 
700 1 |a Tittel, Ed. 
700 1 |a Chapple, Mike. 
758 |i has work:  |a (ISC)² CISSP certified information systems security professional (Work)  |1 https://id.oclc.org/worldcat/entity/E39PCFxvp4MqCtYGtHYdFDvd8K  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Stewart, James Michael.  |t CISSP.  |b 4th ed.  |d Indianapolis, Ind. : Wiley Pub., 2008  |w (DLC) 2008022835 
830 0 |a Serious skills. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=353313  |z Texto completo 
938 |a Internet Archive  |b INAR  |n cisspcertifiedin0000stew_y2j0 
938 |a Askews and Holts Library Services  |b ASKH  |n AH3917459 
938 |a 123Library  |b 123L  |n 9779 
938 |a Books 24x7  |b B247  |n bks00025182 
938 |a Coutts Information Services  |b COUT  |n 8860957 
938 |a ebrary  |b EBRY  |n ebr10249138 
938 |a EBSCOhost  |b EBSC  |n 234670 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 175235 
938 |a YBP Library Services  |b YANK  |n 2861880 
994 |a 92  |b IZTAP