Flylib.com
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors:
Michael Gregg
BUY ON AMAZON
The CISSP Cram Sheet
PHYSICAL SECURITY
SECURITY-MANAGEMENT PRACTICES
ACCESS-CONTROL SYSTEMS AND METHODOLOGY
SECURITY MODELS AND ARCHITECTURES
TELECOMMUNICATIONS AND NETWORK SECURITY
APPLICATION AND SYSTEMS-DEVELOPMENT SECURITY
OPERATIONS SECURITY
BUSINESS CONTINUITY PLANNING
LAW, INVESTIGATIONS, AND ETHICS
CRYPTOGRAPHY
A Note from Series Editor Ed Tittel
A Note from Series Editor Ed Tittel
About the Author
About the Author
Acknowledgments
Acknowledgments
We Want to Hear from You!
We Want to Hear from You!
Introduction
Introduction
How to Prepare for the Exam
Taking a Certification Exam
Tracking Your CISSP Status
About This Book
Self-Assessment
Self-Assessment
CISSPs in the Real World
The Ideal CISSP Candidate
Put Yourself to the Test
After the Exam
The CISSP Certification Exam
The CISSP Certification Exam
Assessing Exam Readiness
Taking the Exam
Multiple-Choice Question Format
Exam Strategy
Question-Handling Strategies
Mastering the Inner Game
Physical Security
Physical Security
Physical Security Risks
Requirements for New Site Locations
Building Defense in Depth
Environmental Controls
Electrical Power
Equipment Life Cycle
Fire Prevention, Detection, and Suppression
Exam Prep Questions
Answers to Exam Prep Questions
Security-Management Practices
Security-Management Practices
The Risk of Poor Security Management
The Role of CIA
Risk Assessment
Policies, Procedures, Standards, Baselines, and Guidelines
Implementation
Training and Education
Auditing Your Security Infrastructure
Exam Prep Questions
Answers to Exam Prep Questions
Access-Control Systems and Methodology
Access-Control Systems and Methodology
Threats Against Access Control
Access-Control Types
Identification, Authentication, and Authorization
Single Sign-On
Data Access Controls
Intrusion-Detection Systems (IDS)
Penetration Testing
Honeypots
Exam Prep Questions
Answers to Exam Prep Questions
System Architecture and Models
System Architecture and Models
Common Flaws in the Security Architecture
Computer System Architecture
Security Mechanisms
Security Models of Control
Documents and Guidelines
System Validation
Exam Prep Questions
Answers to Exam Prep Questions
Telecommunications and Network Security
Telecommunications and Network Security
Threats to Network Security
LANs and Their Components
WANS and Their Components
Network Models and Standards
Network Equipment
Access Methods and Remote Connectivity
Message Privacy
Network Access Controls
Exam Prep Questions
Answers to Exam Prep Questions
Applications and Systems-Development Security
Applications and Systems-Development Security
Malicious Code
Failure States
The System Development Life Cycle
Software-Development Methods
Change Management
Programming Languages
Database Management
Exam Prep Questions
Answers to Exam Prep Questions
Operations Security
Operations Security
Hack Attacks
Operational Security
Auditing and Monitoring
Categories of Control
Fax Control
Ethical Hacking
Contingency Planning, Backup, and Recovery
Exam Prep Questions
Answers to Exam Prep Questions
Business Continuity Planning
Business Continuity Planning
The Risks of Poor Business Planning
Business Continuity Management
Business Continuity Plan (BCP)
Disaster Recovery Planning (DRP)
Exam Prep Questions
Answers to Exam Prep Questions
Law, Investigations, and Ethics
Law, Investigations, and Ethics
Computer Crimes
Common Attacks
Ethics
International Property Laws
Parameters of Investigation
Forensics
Major Legal Systems
Exam Prep Questions
Answers to Exam Prep Questions
Cryptography
Cryptography
Cryptographic Basics
History of Encryption
Symmetric Encryption
Asymmetric Encryption
Integrity and Authentication
Steganography
Public Key Infrastructure (PKI)
Cryptographic Services
Cryptographic Attacks
Exam Prep Questions
Answers to Exam Prep Questions
Practice Exam 1
Practice Exam 1
Practice Exam Questions
Answers to Practice Exam 1
Answer Key
Answers to Practice Exam Questions
Practice Exam 2
Practice Exam 2
Practice Exam Questions
Answers to Practice Exam 2
Answers to Practice Exam 2
Answer Key
Answers to Practice Exam Questions
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors:
Michael Gregg
BUY ON AMAZON
Oracle Developer Forms Techniques
Timers and Displaying a Clock
Ordering by Foreign Key Items in Forms
Using Form and Global Variables
Advanced Forms Programming
Summary
Programming Microsoft ASP.NET 3.5
Web Forms Internals
ASP.NET Security
Working with Web Services
Design-Time Support for Custom Controls
Index
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 7. Send SMS from a PowerBook
Hack 18. Blog from Your Mobile Phone
Hack 20. Share Your GPS
Hacks 2339: Introduction
Hack 24. Discover Networks with NetStumbler
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Sap Bw: a Step By Step Guide for Bw 2.0
Summary
InfoCube Design Alternative II-Dimension Characteristics
Installing Business Content Objects and Loading R/3 Data
Creating Views in R/3
Section A.1. ASAP for BW
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Value Stream Mapping and Process Flow Tools
Data Collection
Identifying and Verifying Causes
Complexity Value Stream Mapping and Complexity Analysis
Selecting and Testing Solutions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies