CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano |
Autore | Oriyano Sean-Philip |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 |
Descrizione fisica | 1 online resource (652 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Examinations
Penetration testing (Computer security) - Examinations Computer networks - Examinations |
ISBN |
1-119-41930-1
1-119-25227-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions Chapter 16: Mobile Device Security |
Record Nr. | UNINA-9910830928003321 |
Oriyano Sean-Philip | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines |
Autore | Krutz Ronald L. <1938-> |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2007 |
Descrizione fisica | 1 online resource (770 p.) |
Disciplina |
004.16
005.8 |
Altri autori (Persone) | VinesRussell Dean <1952-> |
Soggetto topico |
Computer security - Testing - Examinations
Computer networks - Security measures - Examinations Computer networks - Examinations Computer hackers |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-97384-6
9786610973842 0-470-23138-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security Disk Encryption |
Record Nr. | UNINA-9910458294803321 |
Krutz Ronald L. <1938-> | ||
Indianapolis, IN, : Wiley, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines |
Autore | Krutz Ronald L. <1938-> |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2007 |
Descrizione fisica | 1 online resource (770 p.) |
Disciplina |
004.16
005.8 |
Altri autori (Persone) | VinesRussell Dean <1952-> |
Soggetto topico |
Computer security - Testing - Examinations
Computer networks - Security measures - Examinations Computer networks - Examinations Computer hackers |
ISBN |
1-280-97384-6
9786610973842 0-470-23138-6 |
Classificazione | 54.89 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security Disk Encryption |
Record Nr. | UNINA-9910784790303321 |
Krutz Ronald L. <1938-> | ||
Indianapolis, IN, : Wiley, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines |
Autore | Krutz Ronald L. <1938-> |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2007 |
Descrizione fisica | 1 online resource (770 p.) |
Disciplina |
004.16
005.8 |
Altri autori (Persone) | VinesRussell Dean <1952-> |
Soggetto topico |
Computer security - Testing - Examinations
Computer networks - Security measures - Examinations Computer networks - Examinations Computer hackers |
ISBN |
1-280-97384-6
9786610973842 0-470-23138-6 |
Classificazione | 54.89 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security Disk Encryption |
Record Nr. | UNINA-9910813170803321 |
Krutz Ronald L. <1938-> | ||
Indianapolis, IN, : Wiley, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson |
Autore | Stewart James Michael |
Edizione | [6th ed.] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2012 |
Descrizione fisica | 1 online resource (938 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
ChappleMike, M.S.
GibsonDarril |
Collana | SYBEX serious skills CISSP |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer security - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-77577-7
9786613686169 1-118-46389-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies WAN Connection Technologies |
Record Nr. | UNINA-9910462659203321 |
Stewart James Michael | ||
Indianapolis, IN, : Wiley, 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson |
Autore | Stewart James Michael |
Edizione | [6th ed.] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2012 |
Descrizione fisica | 1 online resource (938 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
ChappleMike, M.S.
GibsonDarril |
Collana | SYBEX serious skills CISSP |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer security - Examinations |
ISBN |
1-280-77577-7
9786613686169 1-118-46389-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies WAN Connection Technologies |
Record Nr. | UNINA-9910790357203321 |
Stewart James Michael | ||
Indianapolis, IN, : Wiley, 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson |
Autore | Stewart James Michael |
Edizione | [6th ed.] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2012 |
Descrizione fisica | 1 online resource (938 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
ChappleMike, M.S.
GibsonDarril |
Collana | SYBEX serious skills CISSP |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer security - Examinations |
ISBN |
1-280-77577-7
9786613686169 1-118-46389-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies WAN Connection Technologies |
Record Nr. | UNINA-9910815148003321 |
Stewart James Michael | ||
Indianapolis, IN, : Wiley, 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple |
Autore | Stewart James Michael |
Edizione | [4th ed.] |
Pubbl/distr/stampa | Indianapolis, Ind., : Wiley Pub., 2008 |
Descrizione fisica | 1 online resource (893 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
TittelEd
ChappleMike |
Collana | Serious skills |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer security - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-75235-5
9786611752354 0-470-39591-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography Cryptographic Basics |
Record Nr. | UNINA-9910454076303321 |
Stewart James Michael | ||
Indianapolis, Ind., : Wiley Pub., 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple |
Autore | Stewart James Michael |
Edizione | [4th ed.] |
Pubbl/distr/stampa | Indianapolis, Ind., : Wiley Pub., 2008 |
Descrizione fisica | 1 online resource (893 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
TittelEd
ChappleMike |
Collana | Serious skills |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer security - Examinations |
ISBN |
1-281-75235-5
9786611752354 0-470-39591-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography Cryptographic Basics |
Record Nr. | UNINA-9910782132103321 |
Stewart James Michael | ||
Indianapolis, Ind., : Wiley Pub., 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple |
Autore | Stewart James Michael |
Edizione | [4th ed.] |
Pubbl/distr/stampa | Indianapolis, Ind., : Wiley Pub., 2008 |
Descrizione fisica | 1 online resource (893 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
TittelEd
ChappleMike |
Collana | Serious skills |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer security - Examinations |
ISBN |
1-281-75235-5
9786611752354 0-470-39591-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography Cryptographic Basics |
Record Nr. | UNINA-9910828073303321 |
Stewart James Michael | ||
Indianapolis, Ind., : Wiley Pub., 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|