- Häftad (Paperback / softback)
- Antal sidor
- 8th Edition
- Sybex Inc.,U.S.
- 228 x 190 x 76 mm
- Antal komponenter
- 1837 g
Du kanske gillar
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Fri frakt inom Sverige för privatpersoner.
Bloggat om (ISC)2 CISSP Certified Information System...
ABOUT THE AUTHORS Mike Chapple, PhD, CISSP, Security+, CISA, CySA+ is Associate Teaching Professor of IT, Analytics and Operations at the University of Notre Dame. He is a leading expert on cybersecurity certification and runs CertMike.com. James Michael Stewart, CISSP, CEH, ECSA, CHFI, Security+, Network+, has focused on security, certification, networking, and various operating systems for more than 25 years. He teaches numerous job skill and certification focused courses. He has authored or coauthored more than 75 books. Darril Gibson, CISSP, Security+, CASP, is CEO of YCDA, LLC. He regularly writes and consults on a variety of technical and security topics, and has authored or coauthored more than 35 books.
Introduction xxxiii Assessment Test xlii Chapter 1 Security Governance Through Principles and Policies 1 Understand and Apply Concepts of Confidentiality, Integrity, and Availability 2 Evaluate and Apply Security Governance Principles 14 Develop, Document, and Implement Security Policy, Standards, Procedures, and Guidelines 26 Understand and Apply Threat Modeling Concepts and Methodologies 30 Apply Risk-Based Management Concepts to the Supply Chain 38 Summary 40 Exam Essentials 42 Written Lab 44 Review Questions 45 Chapter 2 Personnel Security and Risk Management Concepts 49 Personnel Security Policies and Procedures 51 Security Governance 62 Understand and Apply Risk Management Concepts 63 Establish and Maintain a Security Awareness, Education, and Training Program 86 Manage the Security Function 87 Summary 88 Exam Essentials 89 Written Lab 92 Review Questions 93 Chapter 3 Business Continuity Planning 97 Planning for Business Continuity 98 Project Scope and Planning 99 Business Impact Assessment 105 Continuity Planning 111 Plan Approval and Implementation 114 Summary 119 Exam Essentials 119 Written Lab 120 Review Questions 121 Chapter 4 Laws, Regulations, and Compliance 125 Categories of Laws 126 Laws 129 Compliance 149 Contracting and Procurement 150 Summary 151 Exam Essentials 152 Written Lab 153 Review Questions 154 Chapter 5 Protecting Security of Assets 159 Identify and Classify Assets 160 Determining Ownership 178 Using Security Baselines 186 Summary 187 Exam Essentials 188 Written Lab 189 Review Questions 190 Chapter 6 Cryptography and Symmetric Key Algorithms 195 Historical Milestones in Cryptography 196 Cryptographic Basics 198 Modern Cryptography 214 Symmetric Cryptography 219 Cryptographic Lifecycle 228 Summary 229 Exam Essentials 229 Written Lab 231 Review Questions 232 Chapter 7 PKI and Cryptographic Applications 237 Asymmetric Cryptography 238 Hash Functions 242 Digital Signatures 246 Public Key Infrastructure 249 Asymmetric Key Management 253 Applied Cryptography 254 Cryptographic Attacks 265 Summary 268 Exam Essentials 269 Written Lab 270 Review Questions 271 Chapter 8 Principles of Security Models, Design, and Capabilities 275 Implement and Manage Engineering Processes Using Secure Design Principles 276 Understand the Fundamental Concepts of Security Models 281 Select Controls Based On Systems Security Requirements 295 Understand Security Capabilities of Information Systems 309 Summary 311 Exam Essentials 312 Written Lab 313 Review Questions 314 Chapter 9 Security Vulnerabilities, Threats, and Countermeasures 319 Assess and Mitigate Security Vulnerabilities 320 Client-Based Systems 342 Server-Based Systems 346 Database Systems Security 347 Distributed Systems and Endpoint Security 350 Internet of Things 358 Industrial Control Systems 359 Assess and Mitigate Vulnerabilities in Web-Based Systems 360 Assess and Mitigate Vulnerabilities in Mobile Systems 365 Assess and Mitigate Vulnerabilities in Embedded Devices and Cyber-Physical Systems 375 Essential Security Protection Mechanisms 379 Common Architecture Flaws and Security Issues 384 Summary 390 Exam Essentials 391 Written Lab 394 Review Questions 395 Chapter 10 Physical Security Requirements 399 Apply Security Principles to Site and Facility Design 400 Implement Site and Facility Security Controls 403 Implement and Manage Physical Security 422 Summary 431 Exam Essentials 432 Written Lab 434 Review Questions 435 Chapter 11 Secure Network Architecture and Securing Network Components 439 OSI Model 440 TCP/IP Model 451 Converged Protocols 470 Wireless Networks 472 Secure Network Components 486 Cabling, Wireless, Topology, Communications, and Transmission Media Technology 495 Summary 513 Exam Essentials 514 Written Lab 516 Review Question