LEADER 05683nam 2200733Ia 450 001 9910790357203321 005 20200520144314.0 010 $a1-280-77577-7 010 $a9786613686169 010 $a1-118-46389-7 035 $a(CKB)2670000000206480 035 $a(EBL)875861 035 $a(OCoLC)796384204 035 $a(SSID)ssj0000687899 035 $a(PQKBManifestationID)11368354 035 $a(PQKBTitleCode)TC0000687899 035 $a(PQKBWorkID)10756814 035 $a(PQKB)10111233 035 $a(MiAaPQ)EBC875861 035 $a(CaSebORM)9781118332108 035 $a(Au-PeEL)EBL875861 035 $a(CaPaEBR)ebr10570728 035 $a(CaONFJC)MIL368616 035 $a(MiAaPQ)EBC7147331 035 $a(Au-PeEL)EBL7147331 035 $a(EXLCZ)992670000000206480 100 $a20120626d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCISSP$b[electronic resource] $eCertified Information Systems Security Professional study guide /$fJames M Stewart, Mike Chapple, Darril Gibson 205 $a6th ed. 210 $aIndianapolis, IN $cWiley$d2012 215 $a1 online resource (938 p.) 225 0 $aSYBEX serious skills CISSP 300 $aIncludes index. 311 $a1-118-33210-5 311 $a1-118-31417-4 327 $aCISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams 327 $aHow to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control 327 $aCentralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary 327 $aExam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions 327 $aChapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies 327 $aWAN Connection Technologies 330 $aFully updated Sybex Study Guide for the industry-leading security certification: CISSP Security professionals consider the Certified Information Systems Security Professional (CISSP) to be the most desired certification to achieve. More than 200,000 have taken the exam, and there are more than 70,000 CISSPs worldwide. This highly respected guide is updated to cover changes made to the CISSP Body of Knowledge in 2012. It also provides additional advice on how to pass each section of the exam. With expanded coverage of key areas, it also includes a full-length, 250-question prac 606 $aElectronic data processing personnel$xCertification 606 $aComputer networks$xExaminations$vStudy guides 606 $aComputer security$xExaminations$vStudy guides 615 0$aElectronic data processing personnel$xCertification. 615 0$aComputer networks$xExaminations 615 0$aComputer security$xExaminations 676 $a005.8 700 $aStewart$b James Michael$0571408 701 $aChapple$b Mike$cM.S.$0889333 701 $aGibson$b Darril$01122631 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910790357203321 996 $aCISSP$93712208 997 $aUNINA