Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 4: Access Control
Figure 4-1:
Use CER to compare FAR and FRR.
Figure 4-2:
Kerberos: Logon initiation (Step 1).
Figure 4-3:
Kerberos: Client/TGS Session Key and TGT generation (Step 2).
Figure 4-4:
Kerberos: Logon completion (Step 3).
Figure 4-5:
Kerberos: Requesting services (Step 4).
Figure 4-6:
Kerberos: Client/ Server Session Key and Service Ticket generation (Step 5).
Figure 4-7:
Kerberos: Decrypt Client/ Server Session Key (Step 6).
Figure 4-8:
Kerberos: Client/ Server communications (Step 7).
Chapter 5: Telecommunications and Network Security
Figure 5-1:
The seven layers of the OSI model.
Figure 5-2:
Data encapsulation in the OSI model.
Figure 5-3:
An FDDI network example.
Chapter 6: Information Security and Risk Management
Figure 6-1:
The C-I-A triad.
Chapter 7: Application Security
Figure 7-1:
A typical system develop-ment model takes a project from start to finish.
Chapter 9: Security Architecture and Design
Figure 9-1:
The main components of a CPU.
Chapter 13: Physical (Environmental) Security
Figure 13-1:
A fire needs these three elements to burn.
Previous page
Table of content
Next page
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242
Authors:
Lawrence C. Miller
,
Peter H. Gregory CISA CISSP
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Understanding the IT Security Process
Scoping the Project
Vulnerability Management
Typical RFP Procurement Steps
Procurement Best Practices
Software Configuration Management
The DoD CM Process Model
Configuration Control
Configuration Verification and Audit
Configuration Change Management
Appendix D Problem Change Report
The CISSP and CAP Prep Guide: Platinum Edition
Access Control
Understanding Certification and Accreditation
Continuous Monitoring Process
Appendix A Answers to Assessment Questions
Appendix G Control Baselines
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Complex Application from the Command Line
Finding Things in Strings
Introduction
Representing a Fixed-Size Numerical Vector
Using Pointers to Class Members
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Internal and External Forms
Client 4An Interactive Query Processor
Summary
Creating an Npgsql-enabled VB Project
PostgreSQL Administration
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #2: Improve Your Processes
Key #4: Base Decisions on Data and Facts
Beyond the Basics: The Five Laws of Lean Six Sigma
Six Things Managers Must Do: How to Support Lean Six Sigma
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies