the cissp prep guide - gold ed.

975 436 0
the cissp prep guide - gold ed.

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

The CISSP ® Prep Guide: Gold Edition Wiley Publishing, Inc. Ronald L. Krutz Russell Dean Vines The CISSP ® Prep Guide: Gold Edition The CISSP ® Prep Guide: Gold Edition Wiley Publishing, Inc. Ronald L. Krutz Russell Dean Vines Publisher: Robert Ipsen Executive Editor: Carol Long Managing Editor: Angela Smith Text Design & Composition: D&G Limited, LLC Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where Wiley Publishing, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. This book is printed on acid-free paper. Copyright © 2003 by Ronald L. Krutz and Russell Dean Vines. All rights reserved. Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copy- right Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspointe Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-mail: permcoordinator@wiley.com. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically dis- claim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002. in print may not be available in electronic versions. Library of Congress Cataloging-in-Publication Data: ISBN 0-471-26802-X Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 Wiley also publishes its books in a variety of electronic formats. Some content that appears For more information about Wiley products, visit our Web site at www.wiley.com. To my wife, Hilda: I have said before, and after 40 years of marriage will say again, thank you for all the usual reasons . . . and for so very many more . . . R . L . K . To the Navajo Nation, thank you for making me feel at home. R . D . V .

Ngày đăng: 25/03/2014, 12:11

Mục lục

  • The CISSP Prep Guide: Gold Edition

    • Cover

    • Chapter 1 Security Management Practices

      • Sample Questions

      • Chapter 2 Access Control Systems

        • Rationale

        • Some Access Control Issues

        • Chapter 3 Telecommunications and Network Security

          • Our Goals

          • Secret Key Cryptography (Symmetric Key)

          • Public (Asymmetric) Key Cryptosystems

          • Approaches to Escrowed Encryption

          • Chapter 5 Security Architecture and Models

            • Security Architecture

            • Chapter 6 Operations Security

              • Our Goals

              • Chapter 7 Applications and Systems Development

                • The Software Life Cycle Development Process

                • The Software Capability Maturity Model (CMM)

                • Chapter 8 Business Continuity Planning and Disaster Recovery Planning

                  • Our Goals

                  • Chapter 9 Law, Investigation, and Ethics

                    • Types of Computer Crime

                    • Chapter 10 Physical Security

                      • Our Goals

                      • Threats to Physical Security

                      • Controls for Physical Security

                      • Appendix A A Process Approach to HIPAA Compliance through a HIPAA-CMM

                        • Background

                        • HIPAA Security Requirements Mappings to PAs

                        • Defining and Using the HIPAA-CMM

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan