top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
CEH v10 certified ethical hacker study guide / / Ric Messier
CEH v10 certified ethical hacker study guide / / Ric Messier
Autore Messier Ric
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, , [2019]
Descrizione fisica 1 online resource (587 pages)
Disciplina 005.8
Soggetto topico Computer security - Examinations
ISBN 1-119-53326-0
1-119-53325-2
1-119-53324-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910830515903321
Messier Ric  
Indianapolis, Indiana : , : Sybex, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing / / Ahmed Sheikh
Certified Ethical Hacker (CEH) preparation guide : lesson-based review of ethical hacking and penetration testing / / Ahmed Sheikh
Autore Sheikh Ahmed
Pubbl/distr/stampa Berkeley, CA : , : Apress, , [2021]
Descrizione fisica 1 online resource (217 pages)
Disciplina 005.8
Soggetto topico Computer security - Examinations
Hackers
ISBN 1-4842-7258-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910735396603321
Sheikh Ahmed  
Berkeley, CA : , : Apress, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISA : certified information systems auditor study guide / / David Cannon, with Brian T. O'Hara and Allen Keele
CISA : certified information systems auditor study guide / / David Cannon, with Brian T. O'Hara and Allen Keele
Autore Cannon David
Edizione [4th ed.]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016]
Descrizione fisica 1 online resource (699 p.)
Soggetto topico Computer security - Examinations
Information storage and retrieval systems - Security measures - Examinations
Computer networks - Security measures - Examinations
Management information systems - Auditing - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-119-05640-3
1-119-41921-2
1-119-05625-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISA: Certified Information Systems Auditor: Study Guide; Contents; Introduction; Assessment Test; Chapter 1 Secrets of a Successful Auditor; Understanding the Demand for IS Audits; Executive Misconduct; More Regulation Ahead; Basic Regulatory Objective; Governance Is Leadership; Three Types of Data Target Different Uses; Audit Results Indicate the Truth; Understanding Policies, Standards, Guidelines, and Procedures; Understanding Professional Ethics; Following the ISACA Professional Code; Preventing Ethical Conflicts; Understanding the Purpose of an Audit; Classifying General Types of Audits
Determining Differences in Audit ApproachUnderstanding the Auditor's Responsibility; Comparing Audits to Assessments; Differentiating between Auditor and Auditee Roles; Applying an Independence Test; Implementing Audit Standards; Where Do Audit Standards Come From?; Understanding the Various Auditing Standards; Specific Regulations Defining Best Practices; Audits to Prove Financial Integrity; Auditor Is an Executive Position; Understanding the Importance of Auditor Confidentiality; Working with Lawyers; Working with Executives; Working with IT Professionals; Retaining Audit Documentation
Providing Good Communication and IntegrationUnderstanding Leadership Duties; Planning and Setting Priorities; Providing Standard Terms of Reference; Dealing with Conflicts and Failures; Identifying the Value of Internal and External Auditors; Understanding the Evidence Rule; Stakeholders: Identifying Whom You Need to Interview; Understanding the Corporate Organizational Structure; Identifying Roles in a Corporate Organizational Structure; Identifying Roles in a Consulting Firm Organizational Structure; Summary; Exam Essentials; Review Questions; Chapter 2 Governance
Strategy Planning for Organizational ControlOverview of the IT Steering Committee; Using the Balanced Scorecard; IT Subset of the BSC; Decoding the IT Strategy; Specifying a Policy; Project Management; Implementation Planning of the IT Strategy; Using COBIT; Identifying Sourcing Locations; Conducting an Executive Performance Review; Understanding the Auditor's Interest in the Strategy; Overview of Tactical Management; Planning and Performance; Management Control Methods; Risk Management; Implementing Standards; Human Resources; System Life-Cycle Management; Continuity Planning; Insurance
Overview of Business Process ReengineeringWhy Use Business Process Reengineering; BPR Methodology; Genius or Insanity?; Goal of BPR; Guiding Principles for BPR; Knowledge Requirements for BPR; BPR Techniques; BPR Application Steps; Role of IS in BPR; Business Process Documentation; BPR Data Management Techniques; Benchmarking as a BPR Tool; Using a Business Impact Analysis; BPR Project Risk Assessment; Practical Application of BPR; Practical Selection Methods for BPR; Troubleshooting BPR Problems; Understanding the Auditor's Interest in Tactical Management; Operations Management
Sustaining Operations
Record Nr. UNINA-9910270935003321
Cannon David  
Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISA : certified information systems auditor study guide / / David Cannon, with Brian T. O'Hara and Allen Keele
CISA : certified information systems auditor study guide / / David Cannon, with Brian T. O'Hara and Allen Keele
Autore Cannon David
Edizione [4th ed.]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016]
Descrizione fisica 1 online resource (699 p.)
Soggetto topico Computer security - Examinations
Information storage and retrieval systems - Security measures - Examinations
Computer networks - Security measures - Examinations
Management information systems - Auditing - Examinations
ISBN 1-119-05640-3
1-119-41921-2
1-119-05625-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISA: Certified Information Systems Auditor: Study Guide; Contents; Introduction; Assessment Test; Chapter 1 Secrets of a Successful Auditor; Understanding the Demand for IS Audits; Executive Misconduct; More Regulation Ahead; Basic Regulatory Objective; Governance Is Leadership; Three Types of Data Target Different Uses; Audit Results Indicate the Truth; Understanding Policies, Standards, Guidelines, and Procedures; Understanding Professional Ethics; Following the ISACA Professional Code; Preventing Ethical Conflicts; Understanding the Purpose of an Audit; Classifying General Types of Audits
Determining Differences in Audit ApproachUnderstanding the Auditor's Responsibility; Comparing Audits to Assessments; Differentiating between Auditor and Auditee Roles; Applying an Independence Test; Implementing Audit Standards; Where Do Audit Standards Come From?; Understanding the Various Auditing Standards; Specific Regulations Defining Best Practices; Audits to Prove Financial Integrity; Auditor Is an Executive Position; Understanding the Importance of Auditor Confidentiality; Working with Lawyers; Working with Executives; Working with IT Professionals; Retaining Audit Documentation
Providing Good Communication and IntegrationUnderstanding Leadership Duties; Planning and Setting Priorities; Providing Standard Terms of Reference; Dealing with Conflicts and Failures; Identifying the Value of Internal and External Auditors; Understanding the Evidence Rule; Stakeholders: Identifying Whom You Need to Interview; Understanding the Corporate Organizational Structure; Identifying Roles in a Corporate Organizational Structure; Identifying Roles in a Consulting Firm Organizational Structure; Summary; Exam Essentials; Review Questions; Chapter 2 Governance
Strategy Planning for Organizational ControlOverview of the IT Steering Committee; Using the Balanced Scorecard; IT Subset of the BSC; Decoding the IT Strategy; Specifying a Policy; Project Management; Implementation Planning of the IT Strategy; Using COBIT; Identifying Sourcing Locations; Conducting an Executive Performance Review; Understanding the Auditor's Interest in the Strategy; Overview of Tactical Management; Planning and Performance; Management Control Methods; Risk Management; Implementing Standards; Human Resources; System Life-Cycle Management; Continuity Planning; Insurance
Overview of Business Process ReengineeringWhy Use Business Process Reengineering; BPR Methodology; Genius or Insanity?; Goal of BPR; Guiding Principles for BPR; Knowledge Requirements for BPR; BPR Techniques; BPR Application Steps; Role of IS in BPR; Business Process Documentation; BPR Data Management Techniques; Benchmarking as a BPR Tool; Using a Business Impact Analysis; BPR Project Risk Assessment; Practical Application of BPR; Practical Selection Methods for BPR; Troubleshooting BPR Problems; Understanding the Auditor's Interest in Tactical Management; Operations Management
Sustaining Operations
Record Nr. UNINA-9910830399303321
Cannon David  
Indianapolis, Indiana : , : Sybex, a Wiley brand, , [2016]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
Autore Stewart James Michael
Edizione [6th ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2012
Descrizione fisica 1 online resource (938 p.)
Disciplina 005.8
Altri autori (Persone) ChappleMike, M.S.
GibsonDarril
Collana SYBEX serious skills CISSP
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-280-77577-7
9786613686169
1-118-46389-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control
Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary
Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions
Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies
WAN Connection Technologies
Record Nr. UNINA-9910462659203321
Stewart James Michael  
Indianapolis, IN, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
Autore Stewart James Michael
Edizione [6th ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2012
Descrizione fisica 1 online resource (938 p.)
Disciplina 005.8
Altri autori (Persone) ChappleMike, M.S.
GibsonDarril
Collana SYBEX serious skills CISSP
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-280-77577-7
9786613686169
1-118-46389-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control
Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary
Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions
Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies
WAN Connection Technologies
Record Nr. UNINA-9910790357203321
Stewart James Michael  
Indianapolis, IN, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
CISSP : Certified Information Systems Security Professional study guide / / James M Stewart, Mike Chapple, Darril Gibson
Autore Stewart James Michael
Edizione [6th ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2012
Descrizione fisica 1 online resource (938 p.)
Disciplina 005.8
Altri autori (Persone) ChappleMike, M.S.
GibsonDarril
Collana SYBEX serious skills CISSP
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-280-77577-7
9786613686169
1-118-46389-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP® Certified Information Systems Security Professional: Study Guide; Acknowledgments; About the Authors; Contents; Introduction; (ISC)2; CISSP and SSCP; Prequalifications; Overview of the CISSP Exam; CISSP Exam Question Types; Advice on Taking the Exam; Study and Exam Preparation Tips; Completing the Certification Process; Post-CISSP Concentrations; Notes on This Book's Organization; The Elements of This Study Guide; What's Included With the Additional Study Tools; The Sybex Test Preparation Software; Electronic Flashcards; Glossary of Terms in PDF; Bonus Practice Exams
How to Use This Book's Study ToolsAssessment Test; Answers to Assessment Test; Chapter 1: Access Control; Access Control Overview; Users, Owners, and Custodians; The CIA Triad; Policies; Compare Permissions, Rights, and Privileges; Types of Access Control; Defense in Depth; Access Control Elements; Identification and Authentication Techniques; Passwords; Smart Cards and Tokens; Biometrics; Multifactor Authentication; Access Control Techniques; Security Operations Principles; Discretionary Access Controls; Nondiscretionary Access Controls; Mandatory Access Controls; Role-Based Access Control
Centralized versus Decentralized Access ControlSingle Sign-On; AAA Protocols; Authorization Mechanisms; Identity and Access Provisioning Life Cycle; Provisioning; Account Review; Account Revocation; Summary; Exam Essentials; Written Lab; Review Questions; Chapter 2: Access Control Attacks and Monitoring; Understanding Access Control Attacks; Introduction to Risk Elements; Asset Valuation; Threat Modeling; Vulnerability Analysis; Common Access Control Attacks; Preventing Access Control Attacks; Logging and Monitoring; Assessing Effectiveness of Access Controls; Handling Audit Reports; Summary
Exam EssentialsWritten Lab; Review Questions; Chapter 3: Secure Network Architecture and Securing Network Components; OSI Model; History of the OSI Model; OSI Functionality; Encapsulation/Deencapsulation; OSI Layers; TCP/IP Model; TCP/IP Protocol Suite Overview; Secure Network Components; Network Access Control; Firewalls; Endpoint Security; Other Network Devices; Cabling, Wireless, Topology, and Communications Technology; Network Cabling; Wireless Communications and Security; Network Topologies; LAN Technologies; Summary; Exam Essentials; Written Lab; Review Questions
Chapter 4: Secure Communications and Network AttacksNetwork and Protocol Security Mechanisms; Secure Communications Protocols; Authentication Protocols; Virtual Private Network; Tunneling; How VPNs Work; Common VPN Protocols; Virtual LAN; Remote Access Security Management; Plan Remote Access Security; Dial-Up Protocols; Centralized Remote Authentication Services; Network Address Translation; Private IP Addresses; Stateful NAT; Static and Dynamic NAT; Automatic Private IP Addressing; Switching Technologies; Circuit Switching; Packet Switching; Virtual Circuits; WAN Technologies
WAN Connection Technologies
Altri titoli varianti Certified Information Systems Security Professional
Record Nr. UNINA-9910815148003321
Stewart James Michael  
Indianapolis, IN, : Wiley, 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [4th ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., 2008
Descrizione fisica 1 online resource (893 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Collana Serious skills
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-281-75235-5
9786611752354
0-470-39591-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions
Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification
Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage
Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography
Cryptographic Basics
Record Nr. UNINA-9910454076303321
Stewart James Michael  
Indianapolis, Ind., : Wiley Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [4th ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., 2008
Descrizione fisica 1 online resource (893 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Collana Serious skills
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-281-75235-5
9786611752354
0-470-39591-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions
Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification
Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage
Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography
Cryptographic Basics
Record Nr. UNINA-9910782132103321
Stewart James Michael  
Indianapolis, Ind., : Wiley Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [4th ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., 2008
Descrizione fisica 1 online resource (893 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Collana Serious skills
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-281-75235-5
9786611752354
0-470-39591-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions
Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification
Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage
Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography
Cryptographic Basics
Record Nr. UNINA-9910828073303321
Stewart James Michael  
Indianapolis, Ind., : Wiley Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui