Database Management

Table of contents:

Need to Know More?

www.jebcl.com/riskdo/riskdo.htm Risk assessment do's and don'ts

www.zdnet.com.au/insight/0,39023731,20281524,00.htm Six steps to change management

http://computing-dictionary.thefreedictionary.com/object-oriented%20programming Object-oriented programming

www.linuxsecurity.com/content/view/119087/49/ Buffer overflows

http://lockdowncorp.com/trojandemo.html How Trojan horse programs work

www.garykessler.net/library/ddos.html The history of DDoS attacks

www.governmentsecurity.org/articles/SQLInjectionModesofAttackDefenceandWhyItMatters.php SQL injection and database manipulation

www.omg.org/gettingstarted/corbafaq.htm CORBA FAQ

www.cultural.com/web/security/compusec.glossary.html Common security terms

The CISSP Cram Sheet

A Note from Series Editor Ed Tittel

About the Author

Acknowledgments

We Want to Hear from You!

Introduction

Self-Assessment

The CISSP Certification Exam

Physical Security

Security-Management Practices

Access-Control Systems and Methodology

System Architecture and Models

Telecommunications and Network Security

Applications and Systems-Development Security

Operations Security

Business Continuity Planning

Law, Investigations, and Ethics

Cryptography

Practice Exam 1

Answers to Practice Exam 1

Practice Exam 2

Answers to Practice Exam 2



CISSP Exam Cram 2
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors: Michael Gregg

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net