Flylib.com
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors:
Michael Gregg
BUY ON AMAZON
The CISSP Cram Sheet
PHYSICAL SECURITY
SECURITY-MANAGEMENT PRACTICES
ACCESS-CONTROL SYSTEMS AND METHODOLOGY
SECURITY MODELS AND ARCHITECTURES
TELECOMMUNICATIONS AND NETWORK SECURITY
APPLICATION AND SYSTEMS-DEVELOPMENT SECURITY
OPERATIONS SECURITY
BUSINESS CONTINUITY PLANNING
LAW, INVESTIGATIONS, AND ETHICS
CRYPTOGRAPHY
A Note from Series Editor Ed Tittel
A Note from Series Editor Ed Tittel
About the Author
About the Author
Acknowledgments
Acknowledgments
We Want to Hear from You!
We Want to Hear from You!
Introduction
Introduction
How to Prepare for the Exam
Taking a Certification Exam
Tracking Your CISSP Status
About This Book
Self-Assessment
Self-Assessment
CISSPs in the Real World
The Ideal CISSP Candidate
Put Yourself to the Test
After the Exam
The CISSP Certification Exam
The CISSP Certification Exam
Assessing Exam Readiness
Taking the Exam
Multiple-Choice Question Format
Exam Strategy
Question-Handling Strategies
Mastering the Inner Game
Physical Security
Physical Security
Physical Security Risks
Requirements for New Site Locations
Building Defense in Depth
Environmental Controls
Electrical Power
Equipment Life Cycle
Fire Prevention, Detection, and Suppression
Exam Prep Questions
Answers to Exam Prep Questions
Security-Management Practices
Security-Management Practices
The Risk of Poor Security Management
The Role of CIA
Risk Assessment
Policies, Procedures, Standards, Baselines, and Guidelines
Implementation
Training and Education
Auditing Your Security Infrastructure
Exam Prep Questions
Answers to Exam Prep Questions
Access-Control Systems and Methodology
Access-Control Systems and Methodology
Threats Against Access Control
Access-Control Types
Identification, Authentication, and Authorization
Single Sign-On
Data Access Controls
Intrusion-Detection Systems (IDS)
Penetration Testing
Honeypots
Exam Prep Questions
Answers to Exam Prep Questions
System Architecture and Models
System Architecture and Models
Common Flaws in the Security Architecture
Computer System Architecture
Security Mechanisms
Security Models of Control
Documents and Guidelines
System Validation
Exam Prep Questions
Answers to Exam Prep Questions
Telecommunications and Network Security
Telecommunications and Network Security
Threats to Network Security
LANs and Their Components
WANS and Their Components
Network Models and Standards
Network Equipment
Access Methods and Remote Connectivity
Message Privacy
Network Access Controls
Exam Prep Questions
Answers to Exam Prep Questions
Applications and Systems-Development Security
Applications and Systems-Development Security
Malicious Code
Failure States
The System Development Life Cycle
Software-Development Methods
Change Management
Programming Languages
Database Management
Exam Prep Questions
Answers to Exam Prep Questions
Operations Security
Operations Security
Hack Attacks
Operational Security
Auditing and Monitoring
Categories of Control
Fax Control
Ethical Hacking
Contingency Planning, Backup, and Recovery
Exam Prep Questions
Answers to Exam Prep Questions
Business Continuity Planning
Business Continuity Planning
The Risks of Poor Business Planning
Business Continuity Management
Business Continuity Plan (BCP)
Disaster Recovery Planning (DRP)
Exam Prep Questions
Answers to Exam Prep Questions
Law, Investigations, and Ethics
Law, Investigations, and Ethics
Computer Crimes
Common Attacks
Ethics
International Property Laws
Parameters of Investigation
Forensics
Major Legal Systems
Exam Prep Questions
Answers to Exam Prep Questions
Cryptography
Cryptography
Cryptographic Basics
History of Encryption
Symmetric Encryption
Asymmetric Encryption
Integrity and Authentication
Steganography
Public Key Infrastructure (PKI)
Cryptographic Services
Cryptographic Attacks
Exam Prep Questions
Answers to Exam Prep Questions
Practice Exam 1
Practice Exam 1
Practice Exam Questions
Answers to Practice Exam 1
Answer Key
Answers to Practice Exam Questions
Practice Exam 2
Practice Exam 2
Practice Exam Questions
Answers to Practice Exam 2
Answers to Practice Exam 2
Answer Key
Answers to Practice Exam Questions
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors:
Michael Gregg
BUY ON AMAZON
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Formatting a Date/Time as a String
Overloading Arithmetic and Assignment Operators for Intuitive Class Behavior
Calling a Superclass Virtual Function
Writing and Reading Currency
Initializing a Sequence with Comma-Separated Values
Java for RPG Programmers, 2nd Edition
String Manipulation
Exceptions
Threads
Database Access
More Java
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Basic Router Configuration
Interface Commands
DSL
Specific Topics
Interior Routing Protocols
Java How to Program (6th Edition) (How to Program (Deitel))
Font Control
Synchronized Collections
Special Section: Challenging Multimedia Projects
Printing Integers
Printing Floating-Point Numbers
Postfix: The Definitive Guide
Postfix Security
Email Routing
Outbound Mail Relay
Postfix Configuration
LDAP
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Properties, Methods, and Events
Code Behind a Document
Working with the Worksheets, Charts, and Sheets Collections
Part Four. Advanced Office Programming
Scenarios for Using Add-Ins
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies