Flylib.com
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors:
Michael Gregg
BUY ON AMAZON
The CISSP Cram Sheet
PHYSICAL SECURITY
SECURITY-MANAGEMENT PRACTICES
ACCESS-CONTROL SYSTEMS AND METHODOLOGY
SECURITY MODELS AND ARCHITECTURES
TELECOMMUNICATIONS AND NETWORK SECURITY
APPLICATION AND SYSTEMS-DEVELOPMENT SECURITY
OPERATIONS SECURITY
BUSINESS CONTINUITY PLANNING
LAW, INVESTIGATIONS, AND ETHICS
CRYPTOGRAPHY
A Note from Series Editor Ed Tittel
A Note from Series Editor Ed Tittel
About the Author
About the Author
Acknowledgments
Acknowledgments
We Want to Hear from You!
We Want to Hear from You!
Introduction
Introduction
How to Prepare for the Exam
Taking a Certification Exam
Tracking Your CISSP Status
About This Book
Self-Assessment
Self-Assessment
CISSPs in the Real World
The Ideal CISSP Candidate
Put Yourself to the Test
After the Exam
The CISSP Certification Exam
The CISSP Certification Exam
Assessing Exam Readiness
Taking the Exam
Multiple-Choice Question Format
Exam Strategy
Question-Handling Strategies
Mastering the Inner Game
Physical Security
Physical Security
Physical Security Risks
Requirements for New Site Locations
Building Defense in Depth
Environmental Controls
Electrical Power
Equipment Life Cycle
Fire Prevention, Detection, and Suppression
Exam Prep Questions
Answers to Exam Prep Questions
Security-Management Practices
Security-Management Practices
The Risk of Poor Security Management
The Role of CIA
Risk Assessment
Policies, Procedures, Standards, Baselines, and Guidelines
Implementation
Training and Education
Auditing Your Security Infrastructure
Exam Prep Questions
Answers to Exam Prep Questions
Access-Control Systems and Methodology
Access-Control Systems and Methodology
Threats Against Access Control
Access-Control Types
Identification, Authentication, and Authorization
Single Sign-On
Data Access Controls
Intrusion-Detection Systems (IDS)
Penetration Testing
Honeypots
Exam Prep Questions
Answers to Exam Prep Questions
System Architecture and Models
System Architecture and Models
Common Flaws in the Security Architecture
Computer System Architecture
Security Mechanisms
Security Models of Control
Documents and Guidelines
System Validation
Exam Prep Questions
Answers to Exam Prep Questions
Telecommunications and Network Security
Telecommunications and Network Security
Threats to Network Security
LANs and Their Components
WANS and Their Components
Network Models and Standards
Network Equipment
Access Methods and Remote Connectivity
Message Privacy
Network Access Controls
Exam Prep Questions
Answers to Exam Prep Questions
Applications and Systems-Development Security
Applications and Systems-Development Security
Malicious Code
Failure States
The System Development Life Cycle
Software-Development Methods
Change Management
Programming Languages
Database Management
Exam Prep Questions
Answers to Exam Prep Questions
Operations Security
Operations Security
Hack Attacks
Operational Security
Auditing and Monitoring
Categories of Control
Fax Control
Ethical Hacking
Contingency Planning, Backup, and Recovery
Exam Prep Questions
Answers to Exam Prep Questions
Business Continuity Planning
Business Continuity Planning
The Risks of Poor Business Planning
Business Continuity Management
Business Continuity Plan (BCP)
Disaster Recovery Planning (DRP)
Exam Prep Questions
Answers to Exam Prep Questions
Law, Investigations, and Ethics
Law, Investigations, and Ethics
Computer Crimes
Common Attacks
Ethics
International Property Laws
Parameters of Investigation
Forensics
Major Legal Systems
Exam Prep Questions
Answers to Exam Prep Questions
Cryptography
Cryptography
Cryptographic Basics
History of Encryption
Symmetric Encryption
Asymmetric Encryption
Integrity and Authentication
Steganography
Public Key Infrastructure (PKI)
Cryptographic Services
Cryptographic Attacks
Exam Prep Questions
Answers to Exam Prep Questions
Practice Exam 1
Practice Exam 1
Practice Exam Questions
Answers to Practice Exam 1
Answer Key
Answers to Practice Exam Questions
Practice Exam 2
Practice Exam 2
Practice Exam Questions
Answers to Practice Exam 2
Answers to Practice Exam 2
Answer Key
Answers to Practice Exam Questions
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors:
Michael Gregg
BUY ON AMAZON
Java I/O
Character Data
PushbackInputStream
The java.util.jar Package
Encryption Basics
Discovering Devices
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Oracle Structures
Data Dictionary Report
Appendix A Common Issues
Appendix B Functions
Inside Network Security Assessment: Guarding Your IT Infrastructure
Security Requires Information Classification
The Role Authentication, Authorization, and Accountability Play in a Secure Organization
Preparing the Final Report
Procurement Terminology
Typical RFP Procurement Steps
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Introduction
Finding Things in Strings
Add Margins to a Text File
Ensuring a Single Copy of a Member Variable
Copying a File
Network Security Architectures
Attack Taxonomy
Common Application Design Considerations
HTTP/HTTPS
Applied Knowledge Questions
Design Evaluations
C & Data Structures (Charles River Media Computer Engineering)
The scanf Function
Strings
Graphs
Problems in Arrays, Searching, Sorting, Hashing
Problems in Strings
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies