Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

Available items only
Author Conrad, Eric, 1967-

Title CISSP study guide / Eric Conrad, Seth Misenar, Joshua Feldman.

Imprint Waltham, MA : Syngress, ©2012.


Location Call No. OPAC Message Status
 Axe Books 24x7 IT E-Book  Electronic Book    ---  Available
Edition 2nd ed.
Description 1 online resource : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Summary The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam's Common Body of Knowledge. The ten domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the ten domains has its own chapter that includes specially designed pedagogy to aid the test-taker in passing the exam, including: Clearly stated exam objectives; Unique terms/Definitions; Exam Warnings; Learning by Example; Hands-On Exercises; Chapter ending questions. Furthermore, special features include: Two practice exams; Tiered chapter ending questions that allow for a gradual learning curve; and a self-test appendix . Provides the most complete and effective study guide to prepare you for passing the CISSP exam-contains only what you need to pass the test, with no fluff! . Eric Conrad has prepared hundreds of professionals for passing the CISSP exam through SANS, a popular and well-known organization for information security professionals. . Covers all of the new information in the Common Body of Knowledge updated in January 2012, and also provides two practice exams, tiered end-of-chapter questions for a gradual learning curve, and a complete self-test appendix.
Note Title information on publisher's Web site; (ScienceDirect; viewed on Aug. 28, 2012).
Bibliography Includes bibliographical references and index.
Contents CISSP® Study Guide -- About the authors -- Lead Author -- Contributing Authors -- About the Technical Editor -- 1. : Introduction -- How to Prepare for the Exam -- The CISSP exam is a management exam -- The notes card approach -- Practice tests -- Read the glossary -- Readiness checklist -- Taking the Exam -- Steps to becoming a CISSP -- Computer-based testing (CBT) -- How to take the exam -- The two-pass method -- Pass one -- Pass two -- The three-pass method -- After the exam -- Good Luck! -- 2. : Domain 1 -- Unique Terms and Definitions -- Introduction.
Cornerstone Information Security ConceptsConfidentiality, integrity, and availability -- Confidentiality -- Integrity -- Availability -- Tension between the concepts -- Disclosure, alteration, and destruction -- Identity and authentication, authorization, and accountability (AAA) -- Identity and authentication -- Authorization -- Accountability -- Non-repudiation -- Least privilege and need to know -- Subjects and objects -- Defense in depth -- Access Control Models -- Discretionary Access Control (DAC) -- Mandatory Access Control (MAC) -- Non-discretionary access control -- Content- and context-dependent access controls.
Centralized access controlDecentralized access control -- Access provisioning lifecycle -- User entitlement, access review, and audit -- Access control protocols and frameworks -- RADIUS -- Diameter -- TACACS and TACACS+ -- PAP and CHAP -- Microsoft Active Directory Domains -- Procedural Issues for Access Control -- Lab els. clearance, formal access approval, and need to know -- Lab els. -- Clearance -- Formal access approval -- Need to know -- Rule-based access controls -- Access control lists -- Access Control Defensive Categories and Types -- Preventive -- Detective -- Corrective -- Recovery -- Deterrent -- Compensating.
Comparing access controlsAuthentication Methods -- Type 1 authentication: something you know -- Passwords -- Password hashes and password cracking -- Dictionary attacks -- Brute-force and hybrid attacks -- Salts -- Password management -- Password control -- Type 2 authentication: something you have -- Synchronous dynamic token -- Asynchronous dynamic token -- Type 3 authentication: something you are -- Biometric fairness, psychological comfort, and safety -- Biometric enrollment and throughput -- Accuracy of biometric systems -- False reject rate (FRR) -- False accept rate (FAR) -- Crossover error rate (CER).
Types of biometric controlsFingerprints -- Retina scan -- Iris scan -- Hand geometry -- Keyboard dynamics -- Dynamic signature -- Voiceprint -- Facial scan -- Someplace you are -- Access Control Technologies -- Single sign-on (SSO) -- Federated identity management -- Kerberos -- Kerberos characteristics -- Kerberos operational steps -- Kerberos strengths -- Kerberos weaknesses -- SESAME -- Security audit logs -- Types of Attackers -- Hackers -- Black hats and white hats -- Script kiddies -- Outsiders -- Insiders -- Hacktivist -- Bots and botnets -- Phishers and spear phishers -- Assessing Access Control -- Penetration testing.
Penetration testing tools and methodology.
Subject Computer networks -- Security measures -- Examinations -- Study guides.
Computer security -- Examinations -- Study guides.
Computer networks -- Security measures -- Examinations. (OCoLC)fst00872343
Computer security -- Examinations. (OCoLC)fst00872489
Genre/Form Electronic books.
Study guides. (OCoLC)fst01423888
Added Author Misenar, Seth.
Feldman, Joshua.
ISBN 9781597499613 (electronic bk.)
1597499617 (electronic bk.)
Standard No. 9781597499613
AU@ 000050015234
AU@ 000051432925
CHBIS 007612517
CHNEW 000620751
CHVBK 185655742
DEBBG BV041121668
DEBBG BV042305234
DEBSZ 396765882
DEBSZ 405344511
DKDLA 820120-katalog:000589005
GBVCP 785368280
NZ1 15189131
NZ1 16237879
CHVBK 51926066X
CHNEW 001010681

Available items only