Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 4: Access Control
Figure 4-1:
Use CER to compare FAR and FRR.
Figure 4-2:
Kerberos: Logon initiation (Step 1).
Figure 4-3:
Kerberos: Client/TGS Session Key and TGT generation (Step 2).
Figure 4-4:
Kerberos: Logon completion (Step 3).
Figure 4-5:
Kerberos: Requesting services (Step 4).
Figure 4-6:
Kerberos: Client/ Server Session Key and Service Ticket generation (Step 5).
Figure 4-7:
Kerberos: Decrypt Client/ Server Session Key (Step 6).
Figure 4-8:
Kerberos: Client/ Server communications (Step 7).
Chapter 5: Telecommunications and Network Security
Figure 5-1:
The seven layers of the OSI model.
Figure 5-2:
Data encapsulation in the OSI model.
Figure 5-3:
An FDDI network example.
Chapter 6: Information Security and Risk Management
Figure 6-1:
The C-I-A triad.
Chapter 7: Application Security
Figure 7-1:
A typical system develop-ment model takes a project from start to finish.
Chapter 9: Security Architecture and Design
Figure 9-1:
The main components of a CPU.
Chapter 13: Physical (Environmental) Security
Figure 13-1:
A fire needs these three elements to burn.
Previous page
Table of content
Next page
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242
Authors:
Lawrence C. Miller
,
Peter H. Gregory CISA CISSP
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Database Modeling
Configuring, Manipulating, and Reusing ORM Models
Creating a Basic Logical Database Model
Reverse Engineering Physical Schemas to Logical Models
Logical Database Model Reports
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Scope Risk
Quantifying and Analyzing Activity Risks
Quantifying and Analyzing Project Risk
Monitoring and Controlling Risky Projects
FileMaker Pro 8: The Missing Manual
Organizing and Editing Records
Extending Calculations
Asking and Telling the User
The Database Design Report
Copying Database Structure
MySQL Clustering
Installation
Testing Your Cluster
Adding Tables
Cluster Topographies
Web Farm/MySQL Farm
.NET-A Complete Development Cycle
Evaluating .NET for Windows Client Applications
Implementing the SmartNotes Application
Project Planning
References for Further Reading
Building the Web Application with ASP.NET
Programming .Net Windows Applications
Some Examples
Fonts
The Analog Clock Project
Containers
Multiuser Updates
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies