05682nam 2200721Ia 450 991045793580332120200520144314.01-280-28704-797866102870480-471-77981-4(CKB)1000000000348191(EBL)242887(OCoLC)63533637(SSID)ssj0000122432(PQKBManifestationID)11982352(PQKBTitleCode)TC0000122432(PQKBWorkID)10123470(PQKB)11092534(MiAaPQ)EBC242887(Au-PeEL)EBL242887(CaPaEBR)ebr10152542(CaONFJC)MIL28704(OCoLC)181840743(EXLCZ)99100000000034819120050616d2005 uy 0engur|n|---|||||txtccrCISSP[electronic resource] Certified Information Systems Security Professional study guide /James Michael Stewart, Ed Tittel, Mike Chapple3rd ed.San Francisco SYBEXc20051 online resource (803 p.)Tittle's name appears first on the earlier editions.Includes index.0-7821-4443-8 CISSP: Certified Information Systems Security Professional Study Guide, 3rd Edition; Acknowledgments; Contents At A Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring; Intrusion Detection; IDS-Related Tools; Penetration TestingMethods of AttacksAccess Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Network Security, and Protocols; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Network and Protocol Services; Avoiding Single Points of Failure; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 4: Communications Security and Countermeasures; Virtual Private Network (VPN); Network Address TranslationSwitching TechnologiesWAN Technologies; Miscellaneous Security Control Characteristics; Managing E-Mail Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and PracticesSecurity RolesSecurity Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage; Knowledge-Based Systems; Systems Development Controls; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password AttacksDenial of Service AttacksApplication Attacks; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 9: Cryptography and Private Key Algorithms; History; Cryptographic Basics; Modern Cryptography; Symmetric Cryptography; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 10: PKI and Cryptographic Applications; Asymmetric Cryptography; Hash Functions; Digital Signatures; Public Key InfrastructureApplied CryptographyCISSP Certified Information Systems Security Professional Study Guide Here's the book you need to prepare for the challenging CISSP exam from (ISC) ̄2. This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in the field of IT security. In addition to the consistent and accessible instructional approach that readers have come to expect from Sybex, this book provides:Clear and concise information on critical security technologies and topicsPrElectronic data processing personnelCertificationComputer networksExaminationsStudy guidesComputer securityExaminationsStudy guidesElectronic books.Electronic data processing personnelCertification.Computer networksExaminationsComputer securityExaminations005.8Stewart James Michael571408Tittel Ed41699Chapple Mike889333Tittel Ed41699MiAaPQMiAaPQMiAaPQBOOK9910457935803321CISSP2444621UNINA