Flylib.com
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors:
Michael Gregg
BUY ON AMAZON
The CISSP Cram Sheet
PHYSICAL SECURITY
SECURITY-MANAGEMENT PRACTICES
ACCESS-CONTROL SYSTEMS AND METHODOLOGY
SECURITY MODELS AND ARCHITECTURES
TELECOMMUNICATIONS AND NETWORK SECURITY
APPLICATION AND SYSTEMS-DEVELOPMENT SECURITY
OPERATIONS SECURITY
BUSINESS CONTINUITY PLANNING
LAW, INVESTIGATIONS, AND ETHICS
CRYPTOGRAPHY
A Note from Series Editor Ed Tittel
A Note from Series Editor Ed Tittel
About the Author
About the Author
Acknowledgments
Acknowledgments
We Want to Hear from You!
We Want to Hear from You!
Introduction
Introduction
How to Prepare for the Exam
Taking a Certification Exam
Tracking Your CISSP Status
About This Book
Self-Assessment
Self-Assessment
CISSPs in the Real World
The Ideal CISSP Candidate
Put Yourself to the Test
After the Exam
The CISSP Certification Exam
The CISSP Certification Exam
Assessing Exam Readiness
Taking the Exam
Multiple-Choice Question Format
Exam Strategy
Question-Handling Strategies
Mastering the Inner Game
Physical Security
Physical Security
Physical Security Risks
Requirements for New Site Locations
Building Defense in Depth
Environmental Controls
Electrical Power
Equipment Life Cycle
Fire Prevention, Detection, and Suppression
Exam Prep Questions
Answers to Exam Prep Questions
Security-Management Practices
Security-Management Practices
The Risk of Poor Security Management
The Role of CIA
Risk Assessment
Policies, Procedures, Standards, Baselines, and Guidelines
Implementation
Training and Education
Auditing Your Security Infrastructure
Exam Prep Questions
Answers to Exam Prep Questions
Access-Control Systems and Methodology
Access-Control Systems and Methodology
Threats Against Access Control
Access-Control Types
Identification, Authentication, and Authorization
Single Sign-On
Data Access Controls
Intrusion-Detection Systems (IDS)
Penetration Testing
Honeypots
Exam Prep Questions
Answers to Exam Prep Questions
System Architecture and Models
System Architecture and Models
Common Flaws in the Security Architecture
Computer System Architecture
Security Mechanisms
Security Models of Control
Documents and Guidelines
System Validation
Exam Prep Questions
Answers to Exam Prep Questions
Telecommunications and Network Security
Telecommunications and Network Security
Threats to Network Security
LANs and Their Components
WANS and Their Components
Network Models and Standards
Network Equipment
Access Methods and Remote Connectivity
Message Privacy
Network Access Controls
Exam Prep Questions
Answers to Exam Prep Questions
Applications and Systems-Development Security
Applications and Systems-Development Security
Malicious Code
Failure States
The System Development Life Cycle
Software-Development Methods
Change Management
Programming Languages
Database Management
Exam Prep Questions
Answers to Exam Prep Questions
Operations Security
Operations Security
Hack Attacks
Operational Security
Auditing and Monitoring
Categories of Control
Fax Control
Ethical Hacking
Contingency Planning, Backup, and Recovery
Exam Prep Questions
Answers to Exam Prep Questions
Business Continuity Planning
Business Continuity Planning
The Risks of Poor Business Planning
Business Continuity Management
Business Continuity Plan (BCP)
Disaster Recovery Planning (DRP)
Exam Prep Questions
Answers to Exam Prep Questions
Law, Investigations, and Ethics
Law, Investigations, and Ethics
Computer Crimes
Common Attacks
Ethics
International Property Laws
Parameters of Investigation
Forensics
Major Legal Systems
Exam Prep Questions
Answers to Exam Prep Questions
Cryptography
Cryptography
Cryptographic Basics
History of Encryption
Symmetric Encryption
Asymmetric Encryption
Integrity and Authentication
Steganography
Public Key Infrastructure (PKI)
Cryptographic Services
Cryptographic Attacks
Exam Prep Questions
Answers to Exam Prep Questions
Practice Exam 1
Practice Exam 1
Practice Exam Questions
Answers to Practice Exam 1
Answer Key
Answers to Practice Exam Questions
Practice Exam 2
Practice Exam 2
Practice Exam Questions
Answers to Practice Exam 2
Answers to Practice Exam 2
Answer Key
Answers to Practice Exam Questions
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors:
Michael Gregg
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Trojans and Backdoors
Session Hijacking
Apply Your Knowledge
Viruses and Worms
Scanning
Competency-Based Human Resource Management
Competency-Based Employee Recruitment and Selection
Competency-Based Employee Rewards
The Transformation to Competency-Based HR Management
Competency-Based HR Management The Next Steps
Appendix A Frequently Asked Questions About Competency-Based HR Management
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Four Precall Planning and Research
Chapter Five Stimulating Interest
Chapter Seven Diagnose Before You Prescribe
Appendix A Value Justification Example
Appendix B Solution Selling: A Scalable Approach
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Temperature-Controlled Supply Chains
The Development of E-tail Logistics
Transforming Technologies: Retail Exchanges and RFID
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Managing Jobs
Configuring a DataSource for JobStoreTX
Using the JobStoreCMT
Implementing a Listener
Requirements of RMI
Understanding Digital Signal Processing (2nd Edition)
THE COMMUTATIVE PROPERTY OF LINEAR TIME-INVARIANT SYSTEMS
QUADRATURE SIGNALS IN THE FREQUENCY DOMAIN
DESIGNING A DISCRETE HILBERT TRANSFORMER
AVERAGING MULTIPLE FAST FOURIER TRANSFORMS
COMPUTING THE INVERSE FFT USING THE FORWARD FFT
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies