top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano
Autore Oriyano Sean-Philip
Edizione [3rd ed.]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016
Descrizione fisica 1 online resource (652 p.)
Disciplina 005.8
Soggetto topico Computer security - Examinations
Penetration testing (Computer security) - Examinations
Computer networks - Examinations
ISBN 1-119-41930-1
1-119-25227-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials
Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking
Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools
DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions
Chapter 16: Mobile Device Security
Record Nr. UNINA-9910830928003321
Oriyano Sean-Philip  
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
Autore Krutz Ronald L. <1938->
Pubbl/distr/stampa Indianapolis, IN, : Wiley, c2007
Descrizione fisica 1 online resource (770 p.)
Disciplina 004.16
005.8
Altri autori (Persone) VinesRussell Dean <1952->
Soggetto topico Computer security - Testing - Examinations
Computer networks - Security measures - Examinations
Computer networks - Examinations
Computer hackers
Soggetto genere / forma Electronic books.
ISBN 1-280-97384-6
9786610973842
0-470-23138-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions
Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking
Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions
Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security
Disk Encryption
Record Nr. UNINA-9910458294803321
Krutz Ronald L. <1938->  
Indianapolis, IN, : Wiley, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
Autore Krutz Ronald L. <1938->
Pubbl/distr/stampa Indianapolis, IN, : Wiley, c2007
Descrizione fisica 1 online resource (770 p.)
Disciplina 004.16
005.8
Altri autori (Persone) VinesRussell Dean <1952->
Soggetto topico Computer security - Testing - Examinations
Computer networks - Security measures - Examinations
Computer networks - Examinations
Computer hackers
ISBN 1-280-97384-6
9786610973842
0-470-23138-6
Classificazione 54.89
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions
Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking
Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions
Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security
Disk Encryption
Record Nr. UNINA-9910784790303321
Krutz Ronald L. <1938->  
Indianapolis, IN, : Wiley, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines
Autore Krutz Ronald L. <1938->
Pubbl/distr/stampa Indianapolis, IN, : Wiley, c2007
Descrizione fisica 1 online resource (770 p.)
Disciplina 004.16
005.8
Altri autori (Persone) VinesRussell Dean <1952->
Soggetto topico Computer security - Testing - Examinations
Computer networks - Security measures - Examinations
Computer networks - Examinations
Computer hackers
ISBN 1-280-97384-6
9786610973842
0-470-23138-6
Classificazione 54.89
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions
Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking
Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions
Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security
Disk Encryption
Record Nr. UNINA-9910813170803321
Krutz Ronald L. <1938->  
Indianapolis, IN, : Wiley, c2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
Autore Stewart James Michael
Edizione [6th ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2012
Descrizione fisica 1 online resource (938 p.)
Disciplina 005.8
Altri autori (Persone) ChappleMike, M.S.
GibsonDarril
Collana SYBEX serious skills CISSP
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-280-77577-7
9786613686169
1-118-46389-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control
Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary
Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions
Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies
WAN Connection Technologies
Record Nr. UNINA-9910462659203321
Stewart James Michael  
Indianapolis, IN, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
Autore Stewart James Michael
Edizione [6th ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2012
Descrizione fisica 1 online resource (938 p.)
Disciplina 005.8
Altri autori (Persone) ChappleMike, M.S.
GibsonDarril
Collana SYBEX serious skills CISSP
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-280-77577-7
9786613686169
1-118-46389-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control
Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary
Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions
Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies
WAN Connection Technologies
Record Nr. UNINA-9910790357203321
Stewart James Michael  
Indianapolis, IN, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
Autore Stewart James Michael
Edizione [6th ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2012
Descrizione fisica 1 online resource (938 p.)
Disciplina 005.8
Altri autori (Persone) ChappleMike, M.S.
GibsonDarril
Collana SYBEX serious skills CISSP
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-280-77577-7
9786613686169
1-118-46389-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control
Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary
Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions
Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies
WAN Connection Technologies
Record Nr. UNINA-9910815148003321
Stewart James Michael  
Indianapolis, IN, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [4th ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., 2008
Descrizione fisica 1 online resource (893 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Collana Serious skills
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-281-75235-5
9786611752354
0-470-39591-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions
Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification
Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage
Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography
Cryptographic Basics
Record Nr. UNINA-9910454076303321
Stewart James Michael  
Indianapolis, Ind., : Wiley Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [4th ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., 2008
Descrizione fisica 1 online resource (893 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Collana Serious skills
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-281-75235-5
9786611752354
0-470-39591-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions
Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification
Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage
Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography
Cryptographic Basics
Record Nr. UNINA-9910782132103321
Stewart James Michael  
Indianapolis, Ind., : Wiley Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [4th ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., 2008
Descrizione fisica 1 online resource (893 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Collana Serious skills
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-281-75235-5
9786611752354
0-470-39591-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions
Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification
Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage
Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography
Cryptographic Basics
Record Nr. UNINA-9910828073303321
Stewart James Michael  
Indianapolis, Ind., : Wiley Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui