List of Tables


Chapter 3: Putting Your Certification to Good Use

Table 3-1: Post-CISSP Activities

Chapter 4: Access Control

Table 4-1: Generally Accepted Standards for Biometric Systems
Table 4-2: General Characteristics of Finger Scan and Hand Geometry Systems
Table 4-3: General Characteristics of Retina and Iris Pattern Systems
Table 4-4: General Characteristics of Voice Recognition and

Chapter 5: Telecommunications and Network Security

Table 5-1: Twisted Pair Cable Classes
Table 5-2: Cable Types and Characteristics
Table 5-3: The IEEE 802 Standards
Table 5-4: Wireless LAN Protocols
Table 5-5: Standard Leased Lines
Table 5-6: ISDN Service Levels
Table 5-7: xDSL Examples
Table 5-8: Circuit Switching versus Packet Switching
Table 5-9: IP Address Classes
Table 5-10: Connection-oriented and Connectionless Protocols

Chapter 9: Security Architecture and Design

Table 9-1: Access Matrix Example
Table 9-2: TCSEC Classes
Table 9-3: ITSEC Functionality (F) Classes and Evaluation (E) Levels
Table 9-4: The Common Criteria

Chapter 11: Business Continuity and Disaster Recovery Planning

Table 10-1: Data Processing Continuity Planning Site Comparison

Chapter 13: Physical (Environmental) Security

Table 13-1: Fire Classes and Suppression/Extinguishing Methods
Table 13-2: Electrical Anomalies
Table 13-3: General Fencing Height Requirements




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net