Find a copy online
Links to this item
Find a copy in the library
Finding libraries that hold this item...
Details
Genre/Form: | Electronic books Examinations Study guides Guides de l'étudiant |
---|---|
Additional Physical Format: | Print version: |
Material Type: | Document, Internet resource |
Document Type: | Internet Resource, Computer File |
All Authors / Contributors: |
Shon Harris; Fernando Maymi |
ISBN: | 9780071849265 0071849262 |
OCLC Number: | 1229170513 |
Language Note: | In English. |
Description: | 1 online resource (1456 pages) : 200 illustrations |
Contents: | Cover -- Title Page -- Copyright Page -- Contents -- In Memory of Shon Harris -- Foreword -- Acknowledgments -- From the Author -- Why Become a CISSP? -- Chapter 1 Security and Risk Management -- Fundamental Principles of Security -- Security Definitions -- Control Types -- Security Frameworks -- The Crux of Computer Crime Laws -- Complexities in Cybercrime -- Intellectual Property Laws -- Privacy -- Data Breaches -- Policies, Standards, Baselines, Guidelines, and Procedures -- Risk Management -- Threat Modeling -- Risk Assessment and Analysis -- Risk Management Frameworks -- Business Continuity and Disaster Recovery -- Personnel Security -- Security Governance -- Ethics -- Summary -- Quick Tips -- Chapter 2 Asset Security -- Information Life Cycle -- Information Classification -- Layers of Responsibility -- Retention Policies -- Protecting Privacy -- Protecting Assets -- Data Leakage -- Protecting Other Assets -- Summary -- Quick Tips -- Chapter 3 Security Engineering -- System Architecture -- Computer Architecture -- Operating Systems -- System Security Architecture -- Security Models -- Systems Evaluation -- Certification vs. Accreditation -- Open vs. Closed Systems -- Distributed System Security -- A Few Threats to Review -- Cryptography in Context -- Cryptography Definitions and Concepts -- Types of Ciphers -- Methods of Encryption -- Types of Symmetric Systems -- Types of Asymmetric Systems -- Message Integrity -- Public Key Infrastructure -- Key Management -- Trusted Platform Module -- Attacks on Cryptography -- Site and Facility Security -- The Site Planning Process -- Protecting Assets -- Internal Support Systems -- Summary -- Quick Tips -- Chapter 4 Communication and Network Security -- Telecommunications -- Open Systems Interconnection Reference Model -- TCP/IP Model -- Types of Transmission -- Cabling -- Networking Foundations -- Networking Devices -- Intranets and Extranets -- Metropolitan Area Networks -- Wide Area Networks -- Remote Connectivity -- Wireless Networks -- Network Encryption -- Network Attacks -- Summary -- Quick Tips -- Chapter 5 Identity and Access Management -- Security Principles -- Identification, Authentication, Authorization, and Accountability -- Access Control Models -- Access Control Techniques and Technologies -- Access Control Administration -- Access Control Methods -- Accountability -- Access Control Practices -- Access Control Monitoring -- Threats to Access Control -- Summary -- Quick Tips -- Chapter 6 Security Assessment and Testing -- Audit Strategies -- Auditing Technical Controls -- Auditing Administrative Controls -- Reporting -- Management Review -- Summary -- Quick Tips -- Chapter 7 Security Operations -- The Role of the Operations Department -- Administrative Management -- Assurance Levels -- Operational Responsibilities -- Configuration Management -- Physical Security -- Secure Resource Provisioning -- Network and Resource Availability -- Preventative Measures -- The Incident Management Process -- Disaster Recovery -- Insurance -- Recovery and Restoration -- Investigations -- Liability and Its Ramifications -- Compliance -- Personal Safety Concerns -- Summary -- Quick Tips -- Chapter 8 Software Development Security -- Building Good Code -- Where Do We Place Security? -- Software Development Life Cycle -- Secure Software Development Best Practices -- Software Development Models -- Integrated Product Team -- Capability Maturity Model Integration -- Change Control -- Programming Languages and Concepts -- Distributed Computing -- Mobile Code -- Web Security -- Database Management -- Malicious Software (Malware) -- Assessing the Security of Acquired Software -- Summary -- Quick Tips -- Appendix A: Comprehensive Questions -- Answers -- Appendix B: About the Download -- System Requirements -- Total Tester Premium Practice Exam Software -- Hotspot and Drag-and-Drop Questions -- Technical Support -- Glossary -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- Z. |
Responsibility: | Shon Harris, Fernando Maymi. |
Reviews
User-contributed reviews
Add a review and share your thoughts with other readers.
Be the first.
Add a review and share your thoughts with other readers.
Be the first.


Tags
Add tags for "CISSP All-in-One Exam Guide, Seventh Edition".
Be the first.