Flylib.com
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors:
Michael Gregg
BUY ON AMAZON
The CISSP Cram Sheet
PHYSICAL SECURITY
SECURITY-MANAGEMENT PRACTICES
ACCESS-CONTROL SYSTEMS AND METHODOLOGY
SECURITY MODELS AND ARCHITECTURES
TELECOMMUNICATIONS AND NETWORK SECURITY
APPLICATION AND SYSTEMS-DEVELOPMENT SECURITY
OPERATIONS SECURITY
BUSINESS CONTINUITY PLANNING
LAW, INVESTIGATIONS, AND ETHICS
CRYPTOGRAPHY
A Note from Series Editor Ed Tittel
A Note from Series Editor Ed Tittel
About the Author
About the Author
Acknowledgments
Acknowledgments
We Want to Hear from You!
We Want to Hear from You!
Introduction
Introduction
How to Prepare for the Exam
Taking a Certification Exam
Tracking Your CISSP Status
About This Book
Self-Assessment
Self-Assessment
CISSPs in the Real World
The Ideal CISSP Candidate
Put Yourself to the Test
After the Exam
The CISSP Certification Exam
The CISSP Certification Exam
Assessing Exam Readiness
Taking the Exam
Multiple-Choice Question Format
Exam Strategy
Question-Handling Strategies
Mastering the Inner Game
Physical Security
Physical Security
Physical Security Risks
Requirements for New Site Locations
Building Defense in Depth
Environmental Controls
Electrical Power
Equipment Life Cycle
Fire Prevention, Detection, and Suppression
Exam Prep Questions
Answers to Exam Prep Questions
Security-Management Practices
Security-Management Practices
The Risk of Poor Security Management
The Role of CIA
Risk Assessment
Policies, Procedures, Standards, Baselines, and Guidelines
Implementation
Training and Education
Auditing Your Security Infrastructure
Exam Prep Questions
Answers to Exam Prep Questions
Access-Control Systems and Methodology
Access-Control Systems and Methodology
Threats Against Access Control
Access-Control Types
Identification, Authentication, and Authorization
Single Sign-On
Data Access Controls
Intrusion-Detection Systems (IDS)
Penetration Testing
Honeypots
Exam Prep Questions
Answers to Exam Prep Questions
System Architecture and Models
System Architecture and Models
Common Flaws in the Security Architecture
Computer System Architecture
Security Mechanisms
Security Models of Control
Documents and Guidelines
System Validation
Exam Prep Questions
Answers to Exam Prep Questions
Telecommunications and Network Security
Telecommunications and Network Security
Threats to Network Security
LANs and Their Components
WANS and Their Components
Network Models and Standards
Network Equipment
Access Methods and Remote Connectivity
Message Privacy
Network Access Controls
Exam Prep Questions
Answers to Exam Prep Questions
Applications and Systems-Development Security
Applications and Systems-Development Security
Malicious Code
Failure States
The System Development Life Cycle
Software-Development Methods
Change Management
Programming Languages
Database Management
Exam Prep Questions
Answers to Exam Prep Questions
Operations Security
Operations Security
Hack Attacks
Operational Security
Auditing and Monitoring
Categories of Control
Fax Control
Ethical Hacking
Contingency Planning, Backup, and Recovery
Exam Prep Questions
Answers to Exam Prep Questions
Business Continuity Planning
Business Continuity Planning
The Risks of Poor Business Planning
Business Continuity Management
Business Continuity Plan (BCP)
Disaster Recovery Planning (DRP)
Exam Prep Questions
Answers to Exam Prep Questions
Law, Investigations, and Ethics
Law, Investigations, and Ethics
Computer Crimes
Common Attacks
Ethics
International Property Laws
Parameters of Investigation
Forensics
Major Legal Systems
Exam Prep Questions
Answers to Exam Prep Questions
Cryptography
Cryptography
Cryptographic Basics
History of Encryption
Symmetric Encryption
Asymmetric Encryption
Integrity and Authentication
Steganography
Public Key Infrastructure (PKI)
Cryptographic Services
Cryptographic Attacks
Exam Prep Questions
Answers to Exam Prep Questions
Practice Exam 1
Practice Exam 1
Practice Exam Questions
Answers to Practice Exam 1
Answer Key
Answers to Practice Exam Questions
Practice Exam 2
Practice Exam 2
Practice Exam Questions
Answers to Practice Exam 2
Answers to Practice Exam 2
Answer Key
Answers to Practice Exam Questions
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors:
Michael Gregg
BUY ON AMAZON
Developing Tablet PC Applications (Charles River Media Programming)
Basics of the .NET Framework
Introduction to the VB .NET Language
Your First Windows Forms Application
Advanced Microsoft Agent
Speech Input with SAPI
MySQL Cookbook
Decomposing Dates and Times Using Formatting Functions
Summarizing with SUM( ) and AVG( )
Testing Whether a Database Exists
Calculating Descriptive Statistics
Calculating Linear Regressions or Correlation Coefficients
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
Partial Page Rendering
The AJAX Control Toolkit
Built-in Application Services
Remote Method Calls with ASP.NET AJAX
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the Authentication Process
Oracle and PL/SQL
Defeating Virtual Private Databases
Running Operating System Commands
MPLS Configuration on Cisco IOS Software
MPLS Terminology
Option 2: Inter-Provider VPNs Using ASBR-to-ASBR Approach
CSC Architecture Benefits
MPLS Features and Case Studies
Case Study 10: BGP Site of Origin
Digital Character Animation 3 (No. 3)
Conclusion
The Language of Movement
Beyond Walking
Adding Personality to a Walk
Acting and Story
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies