The CISSP and CAP Prep Guide [electronic resource] : Platinum Edition

Author
Krutz, Ronald L. [Browse]
Format
Book
Language
English
Εdition
3rd ed.
Published/​Created
Hoboken : Wiley, 2007.
Description
1 online resource (1272 p.)

Details

Subject(s)
Related name
Summary note
This follow-on edition to The CISSP Prep Guide: Mastering CISSP and ISSEP offers value-add coverage not featured anywhere else! You'll prepare for passing CISSP with a revised review of each of the ten CISSP domains, updated to reflect current thinking/technology, especially in the areas of cyber-terrorism prevention and disaster recovery. You'll also cover CAP, a major section of the ISSEP that has been elevated from its status as part of an advanced concentration to its own certification. The accompanying CD-ROM contains revised test questions to make your preparation complete. Order
Notes
Description based upon print version of record.
Language note
English
Contents
  • The CISSP and CAP Prep Guide: Platinum Edition; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; The (ISC) Organization; Candidate CISSP Requirements; The CISSP Examination; The ISSEP, ISSAP, and ISSMP Concentration Examinations; The Approach of This Book; Changes to the Platinum Edition; Organization of the Book; CD-ROM; Who Should Read This Book?; Summary; Part I: Focused Review of the CISSP Ten Domains; Chapter 1: Information Security and Risk Management; Our Approach; Security Management Concepts; Information Classification Process
  • Security Policy ImplementationRoles and Responsibilities; Risk Management and Assessment; Security Awareness; Assessment Questions; Rationale; Chapter 2: Access Control; Controls; Models for Controlling Access; Access Control Attacks; Penetration Testing; Identification and Authentication; Single Sign-On (SSO); Access Control Methodologies; Assessment Questions; Chapter 3: Telecommunications and Network Security; The C.I.A. Triad; Protocols; LAN Technologies; Cabling Types; Network Topologies; LAN Transmission Protocols; Networking Devices; Firewall Types; Firewall Architectures
  • Common Data Network ServicesData Network Types; WAN Technologies; Remote Access Technologies; Network Availability; Wireless Technologies; Wireless Security; Intrusion Detection and Response; Network Attacks and Abuses; Probing and Scanning; Malicious Code; Web Security; Assessment Questions; Chapter 4: Cryptography; Introduction; Definitions; Background; Cryptographic Technologies; Classical Ciphers; Secret-Key Cryptography (Symmetric-Key); Public-Key (Asymmetric) Cryptosystems; Cryptographic Attacks; Public-Key Certification Systems; Approaches to Escrowed Encryption
  • Identity-Based EncryptionQuantum Computing; E-mail Security Issues and Approaches; Internet Security Applications; Wireless Security; Assessment Questions; Chapter 5: Security Architecture and Design; Computer Architecture; Protection Mechanisms; Assurance; Information Security Models; Assessment Questions; Chapter 6: Operations Security; Operations Security Concepts; Controls and Protections; Monitoring and Auditing; Threats and Vulnerabilities; Maintaining Resource Availability; Operational E-Mail Security; E-Mail Phishing; Fax Security; Assessment Questions; Chapter 7: Application Security
  • Systems EngineeringThe System Life Cycle or System Development Life Cycle (SDLC); The Software Life Cycle Development Process; The Software Capability Maturity Model (CMM); Agile Methodology; Object-Oriented Systems; Artificial Intelligence Systems; Database Systems; Application Controls; Assessment Questions; Chapter 8: Business Continuity Planning and Disaster Recovery Planning; Business Continuity Planning; Disaster Recovery Planning (DRP); Assessment Questions; Chapter 9: Legal, Regulations, Compliance, and Investigations; Types of Computer Crime; Examples of Computer Crime; Law
  • Investigation
ISBN
  • 1-280-90007-5
  • 9786610900077
  • 0-470-10179-2
OCLC
437182321
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...
Other views
Staff view

Supplementary Information