Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 4: Access Control
Figure 4-1:
Use CER to compare FAR and FRR.
Figure 4-2:
Kerberos: Logon initiation (Step 1).
Figure 4-3:
Kerberos: Client/TGS Session Key and TGT generation (Step 2).
Figure 4-4:
Kerberos: Logon completion (Step 3).
Figure 4-5:
Kerberos: Requesting services (Step 4).
Figure 4-6:
Kerberos: Client/ Server Session Key and Service Ticket generation (Step 5).
Figure 4-7:
Kerberos: Decrypt Client/ Server Session Key (Step 6).
Figure 4-8:
Kerberos: Client/ Server communications (Step 7).
Chapter 5: Telecommunications and Network Security
Figure 5-1:
The seven layers of the OSI model.
Figure 5-2:
Data encapsulation in the OSI model.
Figure 5-3:
An FDDI network example.
Chapter 6: Information Security and Risk Management
Figure 6-1:
The C-I-A triad.
Chapter 7: Application Security
Figure 7-1:
A typical system develop-ment model takes a project from start to finish.
Chapter 9: Security Architecture and Design
Figure 9-1:
The main components of a CPU.
Chapter 13: Physical (Environmental) Security
Figure 13-1:
A fire needs these three elements to burn.
Previous page
Table of content
Next page
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242
Authors:
Lawrence C. Miller
,
Peter H. Gregory CISA CISSP
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Searching and Analyzing Data
Finding Rows in a DataView
Transmitting a DataSet Securely
Synchronizing a DataSet with an XML Document
A.1. General Considerations
Inside Network Security Assessment: Guarding Your IT Infrastructure
A Brief History of Security Tools
Ranking Your Findings
Audit and Compliance
General Security Websites
Document Tracking Form
Software Configuration Management
Introduction to Software Configuration Management
Appendix L Software Requirements Changes
Appendix U Acronyms and Glossary
Appendix W Physical Configuration Audit (PCA) Checklist
Appendix Y Supplier CM Market Analysis Questionnaire
A Practitioners Guide to Software Test Design
Equivalence Class Testing
Pairwise Testing
State-Transition Testing
Exploratory Testing
Test Planning
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Gaining Drawing Strategies: Part 2
Using Layers to Organize Your Drawing
Grouping Objects into Blocks
Working with Hatches and Fills
Managing External References
Web Systems Design and Online Consumer Behavior
Chapter II Information Search on the Internet: A Causal Model
Chapter V Consumer Complaint Behavior in the Online Environment
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XVIII Web Systems Design, Litigation, and Online Consumer Behavior
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies