APPLICATION AND SYSTEMS-DEVELOPMENT SECURITY

  1. Polyinstantiation allows different records to exist in the same table at various security levels.
  2. Database models can be relational, using attributes (columns) and tuples (rows); hierarchical, combining records and fields in a logical tree structure; or distributed, storing information in more than one database.
  3. The system life cycle includes the following stages: project initiation, functional design and planning, system design, functional review, software development, product installation, operation and maintenance, and disposal and replacement.

The CISSP Cram Sheet

A Note from Series Editor Ed Tittel

About the Author

Acknowledgments

We Want to Hear from You!

Introduction

Self-Assessment

The CISSP Certification Exam

Physical Security

Security-Management Practices

Access-Control Systems and Methodology

System Architecture and Models

Telecommunications and Network Security

Applications and Systems-Development Security

Operations Security

Business Continuity Planning

Law, Investigations, and Ethics

Cryptography

Practice Exam 1

Answers to Practice Exam 1

Practice Exam 2

Answers to Practice Exam 2



CISSP Exam Cram 2
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors: Michael Gregg

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net