LEADER 05572nam 2200697Ia 450 001 9910782132103321 005 20230721032634.0 010 $a1-281-75235-5 010 $a9786611752354 010 $a0-470-39591-5 035 $a(CKB)1000000000537134 035 $a(EBL)353313 035 $a(OCoLC)611581006 035 $a(SSID)ssj0000122433 035 $a(PQKBManifestationID)11133485 035 $a(PQKBTitleCode)TC0000122433 035 $a(PQKBWorkID)10131492 035 $a(PQKB)10316702 035 $a(MiAaPQ)EBC353313 035 $a(CaSebORM)9780470276884 035 $a(Au-PeEL)EBL353313 035 $a(CaPaEBR)ebr10249138 035 $a(CaONFJC)MIL175235 035 $a(EXLCZ)991000000000537134 100 $a20080522d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCISSP$b[electronic resource] $eCertified Information systems Security Professional ; study guide /$fJames Michael Stewart, Ed Tittel, Mike Chapple 205 $a4th ed. 210 $aIndianapolis, Ind. $cWiley Pub.$d2008 215 $a1 online resource (893 p.) 225 1 $aSerious skills 300 $aIncludes index. 311 $a0-470-27688-6 327 $aCISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring 327 $aIntrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions 327 $aChapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification 327 $aPlanning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage 327 $aKnowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography 327 $aCryptographic Basics 330 $aBuilding on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% coverage of the CISSP Body of Knowledge exam objectives. Find clear and concise information on crucial security topics, practical examples and insights drawn from real-world experience, and cutting-edge exam preparation software, including two full-length bonus exams and electronic flashcards. Prepare yourself by reviewing the key exam topics, including access control, application security, business continuity and disaster recovery plannin 606 $aElectronic data processing personnel$xCertification 606 $aComputer networks$xExaminations$vStudy guides 606 $aComputer security$xExaminations$vStudy guides 615 0$aElectronic data processing personnel$xCertification. 615 0$aComputer networks$xExaminations 615 0$aComputer security$xExaminations 676 $a005.8 700 $aStewart$b James Michael$0571408 701 $aTittel$b Ed$041699 701 $aChapple$b Mike$0889333 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910782132103321 996 $aCISSP$93672051 997 $aUNINA