Coverart for item
The Resource CISSP study guide, Eric Conrad, Seth Misenar, Joshua Feldman

CISSP study guide, Eric Conrad, Seth Misenar, Joshua Feldman

Label
CISSP study guide
Title
CISSP study guide
Statement of responsibility
Eric Conrad, Seth Misenar, Joshua Feldman
Creator
Contributor
Subject
Genre
Language
eng
Summary
The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam's Common Body of Knowledge. The ten domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the ten domains has its own chapter that includes specially designed pedagogy to aid the test-taker in passing the exam, including: Clearly stated exam objectives; Unique terms/Definitions; Exam Warnings; Learning by Example; Hands-On Exercises; Chapter ending questions. Furthermore, special features include: Two practice exams; Tiered chapter ending questions that allow for a gradual learning curve; and a self-test appendix . Provides the most complete and effective study guide to prepare you for passing the CISSP exam-contains only what you need to pass the test, with no fluff! . Eric Conrad has prepared hundreds of professionals for passing the CISSP exam through SANS, a popular and well-known organization for information security professionals. . Covers all of the new information in the Common Body of Knowledge updated in January 2012, and also provides two practice exams, tiered end-of-chapter questions for a gradual learning curve, and a complete self-test appendix
Cataloging source
OPELS
http://library.link/vocab/creatorDate
1967-
http://library.link/vocab/creatorName
Conrad, Eric
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
TK5105.59
LC item number
.C66 2012
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Misenar, Seth
  • Feldman, Joshua
http://library.link/vocab/subjectName
  • Computer networks
  • Computer security
  • Computer networks
  • Computer security
Label
CISSP study guide, Eric Conrad, Seth Misenar, Joshua Feldman
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • The CISSP exam is a management exam
  • The notes card approach
  • Practice tests
  • Read the glossary
  • Readiness checklist
  • Taking the Exam
  • Steps to becoming a CISSP
  • Computer-based testing (CBT)
  • How to take the exam
  • The two-pass method
  • CISSP® Study Guide
  • Pass one
  • Pass two
  • The three-pass method
  • After the exam
  • Good Luck!
  • 2.
  • : Domain 1
  • Unique Terms and Definitions
  • Introduction
  • About the authors
  • Lead Author
  • Contributing Authors
  • About the Technical Editor
  • 1.
  • : Introduction
  • How to Prepare for the Exam
  • Authorization
  • Accountability
  • Non-repudiation
  • Least privilege and need to know
  • Subjects and objects
  • Defense in depth
  • Access Control Models
  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)
  • Non-discretionary access control
  • Cornerstone Information Security ConceptsConfidentiality, integrity, and availability
  • Content- and context-dependent access controls
  • Confidentiality
  • Integrity
  • Availability
  • Tension between the concepts
  • Disclosure, alteration, and destruction
  • Identity and authentication, authorization, and accountability (AAA)
  • Identity and authentication
  • Microsoft Active Directory Domains
  • Procedural Issues for Access Control
  • Lab els.
  • clearance, formal access approval, and need to know
  • Lab els.
  • Clearance
  • Formal access approval
  • Need to know
  • Rule-based access controls
  • Access control lists
  • Centralized access controlDecentralized access control
  • Access Control Defensive Categories and Types
  • Preventive
  • Detective
  • Corrective
  • Recovery
  • Deterrent
  • Compensating
  • Access provisioning lifecycle
  • User entitlement, access review, and audit
  • Access control protocols and frameworks
  • RADIUS
  • Diameter
  • TACACS and TACACS+
  • PAP and CHAP
  • Password control
  • Type 2 authentication: something you have
  • Synchronous dynamic token
  • Asynchronous dynamic token
  • Type 3 authentication: something you are
  • Biometric fairness, psychological comfort, and safety
  • Biometric enrollment and throughput
  • Accuracy of biometric systems
  • False reject rate (FRR)
  • False accept rate (FAR)
  • Comparing access controlsAuthentication Methods
  • Crossover error rate (CER)
  • Type 1 authentication: something you know
  • Passwords
  • Password hashes and password cracking
  • Dictionary attacks
  • Brute-force and hybrid attacks
  • Salts
  • Password management
  • Someplace you are
  • Access Control Technologies
  • Single sign-on (SSO)
  • Federated identity management
  • Kerberos
  • Kerberos characteristics
  • Kerberos operational steps
  • Kerberos strengths
  • Kerberos weaknesses
  • SESAME
  • Types of biometric controlsFingerprints
  • Security audit logs
  • Types of Attackers
  • Hackers
  • Black hats and white hats
  • Script kiddies
  • Outsiders
  • Insiders
  • Hacktivist
  • Bots and botnets
  • Phishers and spear phishers
  • Retina scan
  • Assessing Access Control
  • Penetration testing
  • Iris scan
  • Hand geometry
  • Keyboard dynamics
  • Dynamic signature
  • Voiceprint
  • Facial scan
  • Penetration testing tools and methodology
Control code
808482630
Dimensions
unknown
Edition
2nd ed.
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9781597499682
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
9781597499613
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000215
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)808482630
Label
CISSP study guide, Eric Conrad, Seth Misenar, Joshua Feldman
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • The CISSP exam is a management exam
  • The notes card approach
  • Practice tests
  • Read the glossary
  • Readiness checklist
  • Taking the Exam
  • Steps to becoming a CISSP
  • Computer-based testing (CBT)
  • How to take the exam
  • The two-pass method
  • CISSP® Study Guide
  • Pass one
  • Pass two
  • The three-pass method
  • After the exam
  • Good Luck!
  • 2.
  • : Domain 1
  • Unique Terms and Definitions
  • Introduction
  • About the authors
  • Lead Author
  • Contributing Authors
  • About the Technical Editor
  • 1.
  • : Introduction
  • How to Prepare for the Exam
  • Authorization
  • Accountability
  • Non-repudiation
  • Least privilege and need to know
  • Subjects and objects
  • Defense in depth
  • Access Control Models
  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)
  • Non-discretionary access control
  • Cornerstone Information Security ConceptsConfidentiality, integrity, and availability
  • Content- and context-dependent access controls
  • Confidentiality
  • Integrity
  • Availability
  • Tension between the concepts
  • Disclosure, alteration, and destruction
  • Identity and authentication, authorization, and accountability (AAA)
  • Identity and authentication
  • Microsoft Active Directory Domains
  • Procedural Issues for Access Control
  • Lab els.
  • clearance, formal access approval, and need to know
  • Lab els.
  • Clearance
  • Formal access approval
  • Need to know
  • Rule-based access controls
  • Access control lists
  • Centralized access controlDecentralized access control
  • Access Control Defensive Categories and Types
  • Preventive
  • Detective
  • Corrective
  • Recovery
  • Deterrent
  • Compensating
  • Access provisioning lifecycle
  • User entitlement, access review, and audit
  • Access control protocols and frameworks
  • RADIUS
  • Diameter
  • TACACS and TACACS+
  • PAP and CHAP
  • Password control
  • Type 2 authentication: something you have
  • Synchronous dynamic token
  • Asynchronous dynamic token
  • Type 3 authentication: something you are
  • Biometric fairness, psychological comfort, and safety
  • Biometric enrollment and throughput
  • Accuracy of biometric systems
  • False reject rate (FRR)
  • False accept rate (FAR)
  • Comparing access controlsAuthentication Methods
  • Crossover error rate (CER)
  • Type 1 authentication: something you know
  • Passwords
  • Password hashes and password cracking
  • Dictionary attacks
  • Brute-force and hybrid attacks
  • Salts
  • Password management
  • Someplace you are
  • Access Control Technologies
  • Single sign-on (SSO)
  • Federated identity management
  • Kerberos
  • Kerberos characteristics
  • Kerberos operational steps
  • Kerberos strengths
  • Kerberos weaknesses
  • SESAME
  • Types of biometric controlsFingerprints
  • Security audit logs
  • Types of Attackers
  • Hackers
  • Black hats and white hats
  • Script kiddies
  • Outsiders
  • Insiders
  • Hacktivist
  • Bots and botnets
  • Phishers and spear phishers
  • Retina scan
  • Assessing Access Control
  • Penetration testing
  • Iris scan
  • Hand geometry
  • Keyboard dynamics
  • Dynamic signature
  • Voiceprint
  • Facial scan
  • Penetration testing tools and methodology
Control code
808482630
Dimensions
unknown
Edition
2nd ed.
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9781597499682
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
9781597499613
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000215
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)808482630

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...