www.jebcl.com/riskdo/riskdo.htm Risk assessment do's and don'ts
www.zdnet.com.au/insight/0,39023731,20281524,00.htm Six steps to change management
http://computing-dictionary.thefreedictionary.com/object-oriented%20programming Object-oriented programming
www.linuxsecurity.com/content/view/119087/49/ Buffer overflows
http://lockdowncorp.com/trojandemo.html How Trojan horse programs work
www.garykessler.net/library/ddos.html The history of DDoS attacks
www.governmentsecurity.org/articles/SQLInjectionModesofAttackDefenceandWhyItMatters.php SQL injection and database manipulation
www.omg.org/gettingstarted/corbafaq.htm CORBA FAQ
www.cultural.com/web/security/compusec.glossary.html Common security terms
The CISSP Cram Sheet
A Note from Series Editor Ed Tittel
About the Author
Acknowledgments
We Want to Hear from You!
Introduction
Self-Assessment
The CISSP Certification Exam
Physical Security
Security-Management Practices
Access-Control Systems and Methodology
System Architecture and Models
Telecommunications and Network Security
Applications and Systems-Development Security
Operations Security
Business Continuity Planning
Law, Investigations, and Ethics
Cryptography
Practice Exam 1
Answers to Practice Exam 1
Practice Exam 2
Answers to Practice Exam 2