CISSP: Certified Information Systems Security Professional Study GuideJohn Wiley & Sons, 13 gru 2005 - 800 CISSP Certified Information Systems Security Professional Study Guide Here's the book you need to prepare for the challenging CISSP exam from (ISC)¯2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in the field of IT security. In addition to the consistent and accessible instructional approach that readers have come to expect from Sybex, this book provides:
You'll find authoritative coverage of key exam topics including:
|
Spis treści
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 1 Accountability and Access Control | 1 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 2 Attacks and Monitoring | 43 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 3 ISO Model Network Security and Protocols | 69 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 4 Communications Security and Countermeasures | 121 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 5 Security Management Concepts and Principles | 153 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 6 Asset Value Policies and Roles | 175 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 7 Data and Application Security Issues | 209 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 8 Malicious Code and Application Attacks | 257 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 12 Principles of Security Models | 415 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 13 Administrative Management | 449 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 14 Auditing and Monitoring | 477 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 15 Business Continuity Planning | 509 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 16 Disaster Recovery Planning | 535 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 17 Law and Investigations | 571 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 18 Incidents and Ethics | 605 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 19 Physical Security Requirements | 627 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 9 Cryptography and Private Key Algorithms | 293 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 10 PKI and Cryptographic Applications | 335 |
Certified Information Systems Security Professional Study Guide 3rd Edition Chapter 11 Principles of Computer Design | 369 |
Certified Information Systems Security Professional Study Guide 3rd Edition Glossary | 659 |
725 | |
Inne wydania - Wyświetl wszystko
CISSP: Certified Information Systems Security Professional Study Guide James M. Stewart,Ed Tittel,Mike Chapple Podgląd niedostępny - 2005 |
CISSP: Certified Information Systems Security Professional Ed Tittel,Mike Chapple,James Michael Stewart Podgląd niedostępny - 2003 |
CISSP: Certified Information Systems Security Professional Study Guide James Michael Stewart,Ed Tittel,Mike Chapple Podgląd niedostępny - 2005 |
Kluczowe wyrazy i wyrażenia
access control activities administrators algorithm antivirus applications asset attack authentication backup Bell-LaPadula model biometric brute force attack buffer overflow Business Continuity Planning cable certification Chapter CIA Triad cipher CISSP classification client communications confidentiality configuration countermeasures cryptography cryptosystem database decrypt denial of service deployed designed detection device disaster recovery plan e-mail electronic employees encryption ensure environment evaluation firewall function hardware hash implement infrastructure integrity Internet intrusion IP address IPSec layer malicious code memory mode monitoring objects one-time pad operating system organization organization’s OSI model packets password perform physical plaintext prevent private key privilege protection protocol public key remote requirements response risk security controls security mechanisms Security Models security policy sensitive server specific standard storage TACACS TCP/IP TCSEC techniques threat tion traffic unauthorized user account virus viruses vulnerabilities