E-Book, Englisch, 590 Seiten
Feldman / Conrad / Misenar CISSP Study Guide
1. Auflage 2010
ISBN: 978-1-59749-564-6
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 590 Seiten
ISBN: 978-1-59749-564-6
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
The CISSP Study Guide is aligned to cover all of the material included in the exam, complete with special attention to recent updates. The ,10 domains are covered completely and as concisely as possible with an eye to passing the exam thr first time. Each of the 10 domains has its own chapter that includes specially-designed pedagogy to aid you in passing the exam.
Clearly Stated Exam Objectives Unique Terms / Definitions Exam Warnings Helpful Notes Learning By Example Stepped Chapter Ending Questions Self Test Appendix Detailed Glossary Web Site (http://booksite.syngress.com/companion/conrad) Contains Two Practice Exams and Ten Podcasts-One for Each Domain  ,
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;CISSP® Study Guide;4
3;Copyright Page;5
4;Contents;6
5;Acknowledgments;18
6;About the authors;20
6.1;Lead Author;20
6.2;Contributing Authors;20
6.3;About the Technical Editor;21
7;Chapter 1: Introduction;22
7.1;How to prepare for the exam;23
7.2;How to take the exam;24
7.3;Good Luck!;27
7.4;Reference;27
8;Chapter 2: Domain 1: Informationsecurity governance andrisk management;28
8.1;Unique terms and definitions;28
8.2;Introduction;28
8.3;Cornerstone information security concepts;29
8.4;Risk analysis;34
8.5;Information security governance;43
8.6;Ethics;52
8.7;Summary of exam objectives;53
8.8;Self test;53
8.9;Self test quick answer key;55
8.10;References;56
9;Chapter 3: Domain 2: Access control;58
9.1;Unique terms and definitions;58
9.2;Introduction;58
9.3;Cornerstone access control concepts;59
9.4;Access control models;62
9.5;Procedural issues for access control;68
9.6;Access control defensive categories and types;71
9.7;Authentication methods;74
9.8;Access control technologies;88
9.9;Types of attackers;94
9.10;Assessing access control;100
9.11;Summary of exam objectives;106
9.12;Self test;106
9.13;Self test quick answer key;109
9.14;References;109
10;Chapter 4: Domain 3: Cryptography;112
10.1;Unique Terms and Definitions;112
10.2;Introduction;112
10.3;Cornerstone Cryptographic Concepts;112
10.4;History of Cryptography;116
10.5;Symmetric Encryption;126
10.6;Asymmetric Encryption;134
10.7;Hash Functions;137
10.8;Cryptographic Attacks;138
10.9;Implementing Cryptography;141
10.10;Summary of Exam Objectives;148
10.11;Self Test;148
10.12;Self Test Quick Answer Key;150
10.13;References;150
11;Chapter 5: Domain 4: Physical(Environmental) security;152
11.1;Unique terms and definitions;152
11.2;Introduction;152
11.3;Perimeter defenses;153
11.4;Site selection, design, and configuration;165
11.5;System defenses;167
11.6;Environmental controls;170
11.7;Summary of exam objectives;181
11.8;Self test;181
11.9;Self test quick answer key;184
11.10;References;184
12;Chapter 6: Domain 5: Security architecture and design;186
12.1;Unique Terms and Definitions;186
12.2;Introduction;186
12.3;Secure System Design Concepts;187
12.4;Secure Hardware Architecture;189
12.5;Secure Operating System and Software Architecture;198
12.6;System Vulnerabilities, Threats, and Countermeasures;204
12.7;Security Models;214
12.8;Evaluation Methods, Certification, and Accreditation;223
12.9;Summary of Exam Objectives;227
12.10;Self Test;228
12.11;Self Test Quick Answer Key;230
12.12;References;230
13;Chapter 7: Domain 6: Businesscontinuity and disasterrecovery planning;232
13.1;Unique terms and definitions;232
13.2;Introduction;232
13.3;BCP and DRP overview and process;233
13.4;Developing a BCP/DRP;244
13.5;Backups and availability;262
13.6;DRP testing, training, and awareness;266
13.7;Continued BCP/DRP maintenance;269
13.8;Specific BCP/DRP frameworks;270
13.9;Summary of exam objectives;272
13.10;Self test;272
13.11;Self test quick answer key;274
13.12;References;275
14;Chapter 8: Domain 7: Telecommunications and network security;276
14.1;Unique terms and definitions;276
14.2;Introduction;276
14.3;Network architecture and design;277
14.4;Network devices and protocols;312
14.5;Secure communications;333
14.6;Summary of exam objectives;345
14.7;Self test;346
14.8;Self test quick answer key;348
14.9;References;348
15;Chapter 9: Domain 8: Application development security;350
15.1;Unique Terms and Definitions;350
15.2;Introduction;350
15.3;Programming Concepts;351
15.4;Application Development Methods;356
15.5;Object-oriented Design and Programming;367
15.6;Software Vulnerabilities, Testing, and Assurance;372
15.7;Databases;377
15.8;Artificial Intelligence;383
15.9;Summary of Exam Objectives;386
15.10;Self Test;387
15.11;Self Test Quick Answer Key;389
15.12;References;389
16;Chapter 10: Domain 9: Operations security;392
16.1;Unique Terms and Definitions;392
16.2;Introduction;392
16.3;Administrative Security;393
16.4;Sensitive Information/Media Security;397
16.5;Asset Management;399
16.6;Continuity of Operations;404
16.7;Incident Response Management;411
16.8;Summary of Exam Objectives;419
16.9;Self Test;421
16.10;Self Test Quick Answer Key;424
16.11;References;424
17;Chapter 11: Domain 10: Legal, regulations, investigations, and compliance;426
17.1;Unique terms and definitions;426
17.2;Introduction;427
17.3;Major legal systems;427
17.4;Criminal, civil, and administrative law;428
17.5;Information security aspects of law;430
17.6;Legal aspects of investigations;441
17.7;Important laws and regulations;450
17.8;Ethics;454
17.9;Summary of exam objectives;456
17.10;Self test;457
17.11;Self test quick answer key;459
17.12;References;460
18;Appendix: Self test;462
18.1;Chapter 2 Domain 1: Information Securitygovernance and Risk Management;462
18.2;Chapter 3 Domain 2: Access Control;466
18.3;Chapter 4 Domain 3: Cryptography;471
18.4;Chapter 5 Domain 4: Physical (Environmental)Security;475
18.5;Chapter 6 Domain 5: Security Architecture Anddesign;480
18.6;Chapter 7 Domain 6: Business Continuity Anddisaster Recovery Planning;484
18.7;Chapter 8 Domain 7: Telecommunications Andnetwork Security;490
18.8;Chapter 9 Domain 8: Application Developmentsecurity;494
18.9;Chapter 10 Domain 9: Operations Security;499
18.10;Chapter 11 Domain 10: Legal, Regulations,Investigations, and Compliance;504
19;Glossary;510
20;Index;546
21;Add Page;590