L


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

languages
LANs (Local Area Networks) 2nd 3rd 4th 5th
laptops
lattice-based access
layers (OSI)
     Layer 1 (Physical) 2nd
     Layer 2 (Data Link) 2nd 3rd
     Layer 3 (Network) 2nd
     Layer 4 (Transport) 2nd 3rd
     Layer 5 (Session) 2nd 3rd
     Layer 6 (Presentation) 2nd 3rd
     Layer 7 (Application) 2nd 3rd
     table of 2nd
liability insurance 2nd
life cycle of projects 2nd
life cycles
     SDLC (Software Development Life Cycle) 2nd 3rd
         Classic Life Cycle Model
         design 2nd 3rd
         development 2nd 3rd
         feasibility 2nd
         implementation 2nd 3rd
         Linear Sequential Model
         programming languages
         prototyping 2nd
         RAD (rapid application development) 2nd
         requirements definition 2nd 3rd
         Software Capability Maturity Model (CMM) 2nd
         Waterfall Method 2nd
limit checks
line management 2nd 3rd
Linear Sequential Model
lists
     ACLs (access-control lists) 2nd
Local Area Networks (LANs) 2nd 3rd 4th 5th
logic bombs
logical access controls 2nd 3rd
     access
     access paths
     access-control matrices
     ACLs (access-control lists) 2nd
     authentication 2nd 3rd 4th
         alert thresholds
         passwords 2nd
         two-factor (strong) authentication
     authorization
     centralized/decentralized
     discretionary access
     identification 2nd 3rd 4th
     lattice-based access
     MACs (mandatory access controls) 2nd
     nondiscretionary access 2nd
     restricted interfaces
     role-based access
     rule-based access
     subjects 2nd
     task-based access
logical relationship checks
logical security controls 2nd 3rd



Exam Cram 2. CISA
Cisa Exam Cram 2
ISBN: B001EEFNHG
EAN: N/A
Year: 2005
Pages: 146

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net