CISSP All-in-One Exam Guide, Seventh Edition (eBook, 2016) [WorldCat.org]
skip to content
CISSP All-in-One Exam Guide, Seventh Edition
Checking...

CISSP All-in-One Exam Guide, Seventh Edition

Author: Shon Harris; Fernando Maymi
Publisher: New York, N.Y. : McGraw-Hill Education, [2016]
Edition/Format:   eBook : Document : EnglishView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Examinations
Study guides
Guides de l'étudiant
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Shon Harris; Fernando Maymi
ISBN: 9780071849265 0071849262
OCLC Number: 1229170513
Language Note: In English.
Description: 1 online resource (1456 pages) : 200 illustrations
Contents: Cover --
Title Page --
Copyright Page --
Contents --
In Memory of Shon Harris --
Foreword --
Acknowledgments --
From the Author --
Why Become a CISSP? --
Chapter 1 Security and Risk Management --
Fundamental Principles of Security --
Security Definitions --
Control Types --
Security Frameworks --
The Crux of Computer Crime Laws --
Complexities in Cybercrime --
Intellectual Property Laws --
Privacy --
Data Breaches --
Policies, Standards, Baselines, Guidelines, and Procedures --
Risk Management --
Threat Modeling --
Risk Assessment and Analysis --
Risk Management Frameworks --
Business Continuity and Disaster Recovery --
Personnel Security --
Security Governance --
Ethics --
Summary --
Quick Tips --
Chapter 2 Asset Security --
Information Life Cycle --
Information Classification --
Layers of Responsibility --
Retention Policies --
Protecting Privacy --
Protecting Assets --
Data Leakage --
Protecting Other Assets --
Summary --
Quick Tips --
Chapter 3 Security Engineering --
System Architecture --
Computer Architecture --
Operating Systems --
System Security Architecture --
Security Models --
Systems Evaluation --
Certification vs. Accreditation --
Open vs. Closed Systems --
Distributed System Security --
A Few Threats to Review --
Cryptography in Context --
Cryptography Definitions and Concepts --
Types of Ciphers --
Methods of Encryption --
Types of Symmetric Systems --
Types of Asymmetric Systems --
Message Integrity --
Public Key Infrastructure --
Key Management --
Trusted Platform Module --
Attacks on Cryptography --
Site and Facility Security --
The Site Planning Process --
Protecting Assets --
Internal Support Systems --
Summary --
Quick Tips --
Chapter 4 Communication and Network Security --
Telecommunications --
Open Systems Interconnection Reference Model --
TCP/IP Model --
Types of Transmission --
Cabling --
Networking Foundations --
Networking Devices --
Intranets and Extranets --
Metropolitan Area Networks --
Wide Area Networks --
Remote Connectivity --
Wireless Networks --
Network Encryption --
Network Attacks --
Summary --
Quick Tips --
Chapter 5 Identity and Access Management --
Security Principles --
Identification, Authentication, Authorization, and Accountability --
Access Control Models --
Access Control Techniques and Technologies --
Access Control Administration --
Access Control Methods --
Accountability --
Access Control Practices --
Access Control Monitoring --
Threats to Access Control --
Summary --
Quick Tips --
Chapter 6 Security Assessment and Testing --
Audit Strategies --
Auditing Technical Controls --
Auditing Administrative Controls --
Reporting --
Management Review --
Summary --
Quick Tips --
Chapter 7 Security Operations --
The Role of the Operations Department --
Administrative Management --
Assurance Levels --
Operational Responsibilities --
Configuration Management --
Physical Security --
Secure Resource Provisioning --
Network and Resource Availability --
Preventative Measures --
The Incident Management Process --
Disaster Recovery --
Insurance --
Recovery and Restoration --
Investigations --
Liability and Its Ramifications --
Compliance --
Personal Safety Concerns --
Summary --
Quick Tips --
Chapter 8 Software Development Security --
Building Good Code --
Where Do We Place Security? --
Software Development Life Cycle --
Secure Software Development Best Practices --
Software Development Models --
Integrated Product Team --
Capability Maturity Model Integration --
Change Control --
Programming Languages and Concepts --
Distributed Computing --
Mobile Code --
Web Security --
Database Management --
Malicious Software (Malware) --
Assessing the Security of Acquired Software --
Summary --
Quick Tips --
Appendix A: Comprehensive Questions --
Answers --
Appendix B: About the Download --
System Requirements --
Total Tester Premium Practice Exam Software --
Hotspot and Drag-and-Drop Questions --
Technical Support --
Glossary --
A --
B --
C --
D --
E --
F --
G --
H --
I --
K --
L --
M --
N --
O --
P --
Q --
R --
S --
T --
U --
V --
W --
Index --
A --
B --
C --
D --
E --
F --
G --
H --
I --
J --
K --
L --
M --
N --
O --
P --
Q --
R --
S --
T --
U --
V --
W --
X --
Z.
Responsibility: Shon Harris, Fernando Maymi.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.