Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 3: Putting Your Certification to Good Use
Why volunteer?
Chapter 4: Access Control
“Polly wanna hacker?”
Chapter 5: Telecommunications and Network Security
Instant Answer
Analog and digital signaling
Asynchronous and synchronous communications
Chapter 6: Information Security and Risk Management
Cross-Reference
Professional ethics
Chapter 7: Application Security
Technical Stuff
Objective trivia
The Open Web Applications Security Project
Technical Stuff The Morris Worm
Bot armies: The power of one
Professional perps and organized crime
Chapter 8: Cryptography
A brief history of cryptography
Instant Answer
The science of crypto
The XORcist
Secure Electronic Transaction (SET)
Chapter 10: Operations Security
Accumulation of privileges
Remember Security is now the law
Tip
ISO 27001: The code of practice for data security
Audit or audit trail?
Audit trails - the justification for time synchronization
Packet sniffing isn’t all bad
Security event resolution
Chapter 11: Business Continuity and Disaster Recovery Planning
Disaster Recovery Planning and September 11
Tip
BCP and DRP: A simple illustration
Warning
Who says External Affairs is nonessential?
Getting amazing things done
Remember
Why hire an expert?
Not only response, but also prevention
Chapter 12: Legal, Regulations, Compliance, and Investigations
Technical Stuff
Lawyer-speak
Previous page
Table of content
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242
Authors:
Lawrence C. Miller
,
Peter H. Gregory CISA CISSP
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 3.3 Use WinSCP as a Graphical Replacement for FTP and RCP
Step 4.5 How to use OpenSSH Passphrase Agents
Step 4.7 Using Public Key Authentication for Automated File Transfers
Step 6.3 X11 Forwarding
Software Configuration Management
Introduction to Software Configuration Management
Configuration Identification
Configuration Verification and Audit
A Practical Approach to Configuration Verification and Audit
Appendix Q Problem Trouble Report (PTR)
Java for RPG Programmers, 2nd Edition
Javas Language And Syntax
Arrays And Vectors
An Object Orientation
Threads
Appendix C Obtaining The Code Samples
C++ How to Program (5th Edition)
(Optional) Software Engineering Case Study: Identifying the Classes in the ATM Requirements Document
Apache HTTP Server
Summary
Wrap-Up
J.4. Headers
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco VPN Products
Architectural Overview
Quality of Service
AIP-SSM Maintenance
Troubleshooting PKI
Extending and Embedding PHP
Anatomy of an Extension
The Resource Data Type
Cycles
Diverting the Stream
Dealing with Errors
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies