Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 3: Putting Your Certification to Good Use
Table 3-1: Post-CISSP Activities
Chapter 4: Access Control
Table 4-1: Generally Accepted Standards for Biometric Systems
Table 4-2: General Characteristics of Finger Scan and Hand Geometry Systems
Table 4-3: General Characteristics of Retina and Iris Pattern Systems
Table 4-4: General Characteristics of Voice Recognition and
Chapter 5: Telecommunications and Network Security
Table 5-1: Twisted Pair Cable Classes
Table 5-2: Cable Types and Characteristics
Table 5-3: The IEEE 802 Standards
Table 5-4: Wireless LAN Protocols
Table 5-5: Standard Leased Lines
Table 5-6: ISDN Service Levels
Table 5-7: xDSL Examples
Table 5-8: Circuit Switching versus Packet Switching
Table 5-9: IP Address Classes
Table 5-10: Connection-oriented and Connectionless Protocols
Chapter 9: Security Architecture and Design
Table 9-1: Access Matrix Example
Table 9-2: TCSEC Classes
Table 9-3: ITSEC Functionality (F) Classes and Evaluation (E) Levels
Table 9-4: The Common Criteria
Chapter 11: Business Continuity and Disaster Recovery Planning
Table 10-1: Data Processing Continuity Planning Site Comparison
Chapter 13: Physical (Environmental) Security
Table 13-1: Fire Classes and Suppression/Extinguishing Methods
Table 13-2: Electrical Anomalies
Table 13-3: General Fencing Height Requirements
Previous page
Table of content
Next page
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242
Authors:
Lawrence C. Miller
,
Peter H. Gregory CISA CISSP
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
Binding to the Directory
Syntactic versus Semantic Conversion
Dealing with Attributes with Many Values
Summary
Error 0x80070005: General access denied error.
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Identifying Project Scope Risk
Managing Project Constraints and Documenting Risks
Managing Project Risk
Conclusion
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Introduction
Storing Objects in a list
Introduction
Working with Polar Coordinates
Initializing a Sequence with Comma-Separated Values
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
Built-in Application Services
Remote Method Calls with ASP.NET AJAX
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Getting Faster to Get Better Why You Need Both Lean and Six Sigma
The Value in Conquering Complexity
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
Phase 1 Readiness Assessment
Designing World-Class Services (Design for Lean Six Sigma)
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Getting Visio and Diagram Help
Working with 1-D and 2-D Shapes
Finding Shapes for Diagrams
Adding Door, Window, and Furniture Shapes to Office Layouts
Key Points
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies