The CISSP and CAP prep guide: platinum edition
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Wiley
2007
|
Schriftenreihe: | Wiley technology publishing : Timely, practical, reliable
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | XXXIV, 1236 S. graph. Darst. 1 CD-ROM |
ISBN: | 0470007923 9780470007921 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036800230 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 101126s2007 d||| |||| 00||| eng d | ||
020 | |a 0470007923 |c cloth/cdrom |9 0-470-00792-3 | ||
020 | |a 9780470007921 |c cloth/cdrom |9 978-0-470-00792-1 | ||
035 | |a (OCoLC)836309334 | ||
035 | |a (DE-599)GBV513814191 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-522 | ||
082 | 0 | |a 004.62 | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Krutz, Ronald L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The CISSP and CAP prep guide |b platinum edition |c Ronald L. Krutz ; Russell Dean Vines |
264 | 1 | |a Indianapolis, Ind. |b Wiley |c 2007 | |
300 | |a XXXIV, 1236 S. |b graph. Darst. |e 1 CD-ROM | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Wiley technology publishing : Timely, practical, reliable | |
650 | 4 | |a Electronic data processing personnel |a Certification | |
650 | 4 | |a Computer networks |a Study guides |a Examinations | |
650 | 4 | |a Computer networks |a Study guides |a Security measures |a Examinations | |
650 | 0 | 7 | |a CISSP |0 (DE-588)4744965-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a CAP |0 (DE-588)4113203-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a CISSP |0 (DE-588)4744965-2 |D s |
689 | 0 | 1 | |a CAP |0 (DE-588)4113203-8 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Vines, Russell Dean |e Verfasser |4 aut | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip0616/2006020712.html |z lizenzfrei |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020716431&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-020716431 |
Datensatz im Suchindex
_version_ | 1804143491808231424 |
---|---|
adam_text | IMAGE 1
ABOUT THE AUTHORS
P. VII
FOREWORD
P. XXIII
ACKNOWLEDGMENTS
P. XXV
INTRODUCTION
P. XXVII
FOCUSED REVIEW OF THE CISSP TEN DOMAINS
P. 1
INFORMATION SECURITY AND RISK MANAGEMENT
P. 3
OUR APPROACH
P. 4
SECURITY MANAGEMENT CONCEPTS
P. 5
SYSTEM SECURITY LIFE CYCLE
P. 5
THE THREE FUNDAMENTALS
P. 6
OTHER IMPORTANT CONCEPTS
P. 7
OBJECTIVES OF SECURITY CONTROLS
P. 10
INFORMATION CLASSIFICATION PROCESS
P. 12
INFORMATION CLASSIFICATION OBJECTIVES
P. 12
INFORMATION CLASSIFICATION BENEFITS
P. 13
INFORMATION CLASSIFICATION CONCEPTS
P. 13
INFORMATION CLASSIFICATION ROLES
P. 16
SECURITY POLICY IMPLEMENTATION
P. 20
POLICIES, STANDARDS, GUIDELINES, AND PROCEDURES
P. 20
ROLES AND RESPONSIBILITIES
P. 25
RISK MANAGEMENT AND ASSESSMENT
P. 27
PRINCIPLES OF RISK MANAGEMENT
P. 27
RM ROLES
P. 30
OVERVIEW OF RISK ANALYSIS
P. 30
SECURITY POSTURE ASSESSMENT METHODOLOGIES
P. 39
SECURITY AWARENESS
P. 42
AWARENESS
P. 44
TRAINING AND EDUCATION
P. 45
ASSESSMENT QUESTIONS
P. 46
ACCESS CONTROL
P. 55
RATIONALE
P. 55
CONTROLS
P. 56
MODELS FOR CONTROLLING ACCESS
P. 57
CONTROL COMBINATIONS
P. 59
ACCESS CONTROL ATTACKS
P. 61
DENIAL OF SERVICE/DISTRIBUTED DENIAL OF SERVICE (DOS/DDOS)
P. 61
BACK DOOR
P. 62
SPOOFING
P. 62
MAN-IN-THE-MIDDLE
P. 63
REPLAY
P. 63
TCP HIJACKING
P. 63
IMAGE 2
SOCIAL ENGINEERING
P. 64
DUMPSTER DIVING
P. 64
PASSWORD GUESSING
P. 65
SOFTWARE EXPLOITATION
P. 65
MOBILE CODE
P. 66
TROJAN HORSES
P. 66
LOGIC BOMB
P. 67
SYSTEM SCANNING
P. 67
PENETRATION TESTING
P. 68
IDENTIFICATION AND AUTHENTICATION
P. 69
PASSWORDS
P. 70
BIOMETRICS
P. 72
SINGLE SIGN-ON (SSO)
P. 74
KERBEROS
P. 75
KERBEROS OPERATION
P. 76
SESAME
P. 79
KRYPTOKNIGHT
P. 79
ACCESS CONTROL METHODOLOGIES
P. 79
CENTRALIZED ACCESS CONTROL
P. 80
DECENTRALIZED/DISTRIBUTED ACCESS CONTROL
P. 81
INTRUSION DETECTION
P. 86
SOME ACCESS CONTROL ISSUES
P. 88
ASSESSMENT QUESTIONS
P. 89
TELECOMMUNICATIONS AND NETWORK SECURITY
P. 95
THE C.I.A. TRIAD
P. 96
CONFIDENTIALITY
P. 96
INTEGRITY
P. 96
AVAILABILITY
P. 97
PROTOCOLS
P. 98
THE LAYERED ARCHITECTURE CONCEPT
P. 98
OPEN SYSTEMS INTERCONNECT (OSI) MODEL
P. 99
TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP)
P. 103
LAN TECHNOLOGIES
P. 110
ETHERNET
P. 110
ARCNET
P. 112
TOKEN RING
P. 112
FIBER DISTRIBUTED DATA INTERFACE (FDDI)
P. 113
CABLING TYPES
P. 113
COAXIAL CABLE (COAX)
P. 113
TWISTED PAIR
P. 114
FIBER-OPTIC CABLE
P. 116
IMAGE 3
CABLING VULNERABILITIES
P. 116
TRANSMISSION TYPES
P. 117
NETWORK TOPOLOGIES
P. 118
BUS
P. 118
RING
P. 118
STAR
P. 118
TREE
P. 120
MESH
P. 120
LAN TRANSMISSION PROTOCOLS
P. 121
CARRIER-SENSE MULTIPLE ACCESS (CSMA)
P. 121
POLLING
P. 122
TOKEN PASSING
P. 122
UNICAST, MULTICAST, BROADCAST
P. 123
NETWORKING DEVICES
P. 123
HUBS AND REPEATERS
P. 123
BRIDGES
P. 124
SPANNING TREE
P. 125
SWITCHES
P. 125
TRANSPARENT BRIDGING
P. 125
ROUTERS
P. 126
VLANS
P. 129
GATEWAYS
P. 130
LAN EXTENDERS
P. 130
FIREWALL TYPES
P. 130
PACKET-FILTERING FIREWALLS
P. 131
APPLICATION-LEVEL FIREWALLS
P. 132
CIRCUIT-LEVEL FIREWALLS
P. 133
STATEFUL INSPECTION FIREWALLS
P. 133
FIREWALL ARCHITECTURES
P. 133
PACKET-FILTERING ROUTERS
P. 134
SCREENED-HOST FIREWALLS
P. 134
DUAL-HOMED HOST FIREWALLS
P. 134
SCREENED-SUBNET FIREWALLS
P. 135
SOCKS
P. 137
COMMON DATA NETWORK SERVICES
P. 137
FILE TRANSFER SERVICES
P. 138
SFTP
P. 139
SSH/SSH-2
P. 139
TFTP
P. 140
DATA NETWORK TYPES
P. 140
WIDE AREA NETWORKS
P. 141
IMAGE 4
INTERNET
P. 141
INTRANET
P. 142
EXTRANET
P. 142
WAN TECHNOLOGIES
P. 142
DEDICATED LINES
P. 142
T-CARRIERS
P. 143
WAN SWITCHING
P. 143
CIRCUIT-SWITCHED NETWORKS
P. 143
PACKET-SWITCHED NETWORKS
P. 144
OTHER WAN PROTOCOLS
P. 146
COMMON WAN DEVICES
P. 146
NETWORK ADDRESS TRANSLATION (NAT)
P. 147
REMOTE ACCESS TECHNOLOGIES
P. 149
REMOTE ACCESS TYPES
P. 149
REMOTE ACCESS SECURITY METHODS
P. 151
VIRTUAL PRIVATE NETWORKING (VPN)
P. 151
RADIUS AND TACACS
P. 160
NETWORK AVAILABILITY
P. 162
HIGH AVAILABILITY AND FAULT TOLERANCE
P. 162
WIRELESS TECHNOLOGIES
P. 164
IEEE WIRELESS STANDARDS
P. 164
BLUETOOTH
P. 170
WIRELESS APPLICATION PROTOCOL (WAP)
P. 171
WIRELESS SECURITY
P. 174
WIRELESS TRANSPORT LAYER SECURITY PROTOCOL
P. 174
WEP ENCRYPTION
P. 175
WIRELESS VULNERABILITIES
P. 175
INTRUSION DETECTION AND RESPONSE
P. 183
TYPES OF INTRUSION DETECTION SYSTEMS
P. 183
IDS APPROACHES
P. 184
HONEY POTS
P. 186
COMPUTER INCIDENT RESPONSE TEAM
P. 187
IDS AND A LAYERED SECURITY APPROACH
P. 188
IDS AND SWITCHES
P. 188
IDS PERFORMANCE
P. 190
NETWORK ATTACKS AND ABUSES
P. 190
LOGON ABUSE
P. 190
INAPPROPRIATE SYSTEM USE
P. 190
EAVESDROPPING
P. 191
NETWORK INTRUSION
P. 191
DENIAL OF SERVICE (DOS) ATTACKS
P. 192
IMAGE 5
SESSION HIJACKING ATTACKS
P. 192
FRAGMENTATION ATTACKS
P. 193
DIAL-UP ATTACKS
P. 193
PROBING AND SCANNING
P. 194
VULNERABILITY SCANNING
P. 194
PORT SCANNING
P. 195
ISSUES WITH VULNERABILITY SCANNING
P. 201
MALICIOUS CODE
P. 202
VIRUSES
P. 202
SPYWARE
P. 204
TROJAN HORSES
P. 210
REMOTE ACCESS TROJANS (RATS)
P. 211
LOGIC BOMBS
P. 212
WORMS
P. 212
MALICIOUS CODE PREVENTION
P. 212
WEB SECURITY
P. 214
PHISHING
P. 214
BROWSER HIJACKING
P. 214
SSL/TLS
P. 215
S-HTTP
P. 217
INSTANT MESSAGING SECURITY
P. 217
8.3 NAMING CONVENTIONS
P. 221
ASSESSMENT QUESTIONS
P. 222
CRYPTOGRAPHY
P. 233
INTRODUCTION
P. 233
DEFINITIONS
P. 234
BACKGROUND
P. 238
CRYPTOGRAPHIC TECHNOLOGIES
P. 241
CLASSICAL CIPHERS
P. 241
SUBSTITUTION
P. 241
TRANSPOSITION (PERMUTATION)
P. 244
VERNAM CIPHER (ONE-TIME PAD)
P. 244
BOOK OR RUNNING-KEY CIPHER
P. 245
CODES
P. 245
STEGANOGRAPHY
P. 245
SECRET-KEY CRYPTOGRAPHY (SYMMETRIC-KEY)
P. 246
DATA ENCRYPTION STANDARD (DES)
P. 247
TRIPLE DES
P. 251
THE ADVANCED ENCRYPTION STANDARD (AES)
P. 252
THE RIJNDAEL BLOCK CIPHER
P. 253
THE TWOFISH ALGORITHM
P. 254
IMAGE 6
THE IDEA CIPHER
P. 255
RC5/RC6
P. 255
PUBLIC-KEY (ASYMMETRIC) CRYPTOSYSTEMS
P. 255
ONE-WAY FUNCTIONS
P. 256
PUBLIC-KEY ALGORITHMS
P. 256
PUBLIC-KEY CRYPTOSYSTEM ALGORITHM CATEGORIES
P. 260
ASYMMETRIC AND SYMMETRIC KEY LENGTH STRENGTH COMPARISONS P. 260
DIGITAL SIGNATURES
P. 260
DIGITAL SIGNATURE STANDARD (DSS) AND SECURE HASH STANDARD (SHS) P. 261
MD5
P. 262
SENDING A MESSAGE WITH A DIGITAL SIGNATURE
P. 263
HASHED MESSAGE AUTHENTICATION CODE (HMAC)
P. 263
HASH FUNCTION CHARACTERISTICS
P. 264
CRYPTOGRAPHIC ATTACKS
P. 264
PUBLIC-KEY CERTIFICATION SYSTEMS
P. 266
DIGITAL CERTIFICATES
P. 266
PUBLIC-KEY INFRASTRUCTURE (PKI)
P. 267
APPROACHES TO ESCROWED ENCRYPTION
P. 273
THE ESCROWED ENCRYPTION STANDARD
P. 273
KEY ESCROW APPROACHES USING PUBLIC-KEY CRYPTOGRAPHY
P. 275
IDENTITY-BASED ENCRYPTION
P. 275
CRYPTOGRAPHIC EXPORT ISSUES
P. 277
QUANTUM COMPUTING
P. 278
E-MAIL SECURITY ISSUES AND APPROACHES
P. 279
SECURE MULTI-PURPOSE INTERNET MAIL EXTENSIONS (S/MIME)
P. 279
MIME OBJECT SECURITY SERVICES (MOSS)
P. 279
PRIVACY ENHANCED MAIL (PEM)
P. 279
PRETTY GOOD PRIVACY (PGP)
P. 280
INTERNET SECURITY APPLICATIONS
P. 281
MESSAGE AUTHENTICATION CODE (MAC) OR THE FINANCIAL INSTITUTION MESSAGE
AUTHENTICATION STANDARD (FIMAS)
P. 281
SECURE ELECTRONIC TRANSACTION (SET)
P. 281
SECURE SOCKETS LAYER (SSL)/TRANSACTION LAYER SECURITY (TLS) P. 281
INTERNET OPEN TRADING PROTOCOL (IOTP)
P. 282
MONDEX
P. 282
IPSEC
P. 282
SECURE HYPERTEXT TRANSFER PROTOCOL (S-HTTP)
P. 283
SECURE SHELL (SSH-2)
P. 284
WIRELESS SECURITY
P. 284
WIRELESS APPLICATION PROTOCOL (WAP)
P. 284
THE IEEE 802.11 WIRELESS STANDARD
P. 286
ASSESSMENT QUESTIONS
P. 289
IMAGE 7
SECURITY ARCHITECTURE AND DESIGN
P. 297
COMPUTER ARCHITECTURE
P. 298
MEMORY
P. 299
INSTRUCTION EXECUTION CYCLE
P. 302
INPUT/OUTPUT STRUCTURES
P. 304
SOFTWARE
P. 305
OPEN AND CLOSED SYSTEMS
P. 307
DISTRIBUTED ARCHITECTURE
P. 307
PROTECTION MECHANISMS
P. 309
RINGS
P. 310
LOGICAL SECURITY GUARD
P. 311
ENTERPRISE ARCHITECTURE ISSUES
P. 311
SECURITY LABELS
P. 312
SECURITY MODES
P. 312
ADDITIONAL SECURITY CONSIDERATIONS
P. 313
RECOVERY PROCEDURES
P. 314
ASSURANCE
P. 314
EVALUATION CRITERIA
P. 315
CERTIFICATION AND ACCREDITATION
P. 317
DITSCAP AND NIACAP
P. 317
THE SYSTEMS SECURITY ENGINEERING CAPABILITY MATURITY MODEL (SSE-CMM) P.
319
INFORMATION SECURITY MODELS
P. 322
ACCESS CONTROL MODELS
P. 322
INTEGRITY MODELS
P. 327
INFORMATION FLOW MODELS
P. 329
ASSESSMENT QUESTIONS
P. 332
OPERATIONS SECURITY
P. 339
OPERATIONS SECURITY CONCEPTS
P. 340
TRIPLES
P. 340
C.I.A.
P. 340
CONTROLS AND PROTECTIONS
P. 341
CATEGORIES OF CONTROLS
P. 341
ORANGE BOOK CONTROLS
P. 342
OPERATIONS CONTROLS
P. 358
MONITORING AND AUDITING
P. 365
MONITORING
P. 365
AUDITING
P. 369
THREATS AND VULNERABILITIES
P. 373
THREATS
P. 373
VULNERABILITIES AND ATTACKS
P. 375
MAINTAINING RESOURCE AVAILABILITY
P. 376
IMAGE 8
RAID
P. 376
RAID LEVELS
P. 377
BACKUP CONCEPTS
P. 378
OPERATIONAL E-MAIL SECURITY
P. 382
E-MAIL PHISHING
P. 383
FAX SECURITY
P. 387
ASSESSMENT QUESTIONS
P. 388
APPLICATION SECURITY
P. 397
SYSTEMS ENGINEERING
P. 398
THE SYSTEM LIFE CYCLE OR SYSTEM DEVELOPMENT LIFE CYCLE (SDLC) P. 398
THE SOFTWARE LIFE CYCLE DEVELOPMENT PROCESS
P. 399
THE WATERFALL MODEL
P. 400
THE SPIRAL MODEL
P. 403
COST ESTIMATION MODELS
P. 406
INFORMATION SECURITY AND THE LIFE CYCLE MODEL
P. 407
TESTING ISSUES
P. 408
THE SOFTWARE MAINTENANCE PHASE AND THE CHANGE CONTROL PROCESS P. 408
CONFIGURATION MANAGEMENT
P. 409
THE SOFTWARE CAPABILITY MATURITY MODEL (CMM)
P. 410
AGILE METHODOLOGY
P. 412
OBJECT-ORIENTED SYSTEMS
P. 413
ARTIFICIAL INTELLIGENCE SYSTEMS
P. 417
EXPERT SYSTEMS
P. 417
NEURAL NETWORKS
P. 419
GENETIC ALGORITHMS
P. 421
KNOWLEDGE MANAGEMENT
P. 421
DATABASE SYSTEMS
P. 421
DATABASE SECURITY ISSUES
P. 422
DATA WAREHOUSE AND DATA MINING
P. 422
DATA DICTIONARIES
P. 423
APPLICATION CONTROLS
P. 423
DISTRIBUTED SYSTEMS
P. 425
CENTRALIZED ARCHITECTURE
P. 426
REAL-TIME SYSTEMS
P. 426
ASSESSMENT QUESTIONS
P. 427
BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING P. 433
BUSINESS CONTINUITY PLANNING
P. 435
CONTINUITY DISRUPTIVE EVENTS
P. 436
THE FOUR PRIME ELEMENTS OF BCP
P. 437
DISASTER RECOVERY PLANNING (DRP)
P. 446
GOALS AND OBJECTIVES OF DRP
P. 446
IMAGE 9
THE DISASTER RECOVERY PLANNING PROCESS
P. 447
TESTING THE DISASTER RECOVERY PLAN
P. 455
DISASTER RECOVERY PROCEDURES
P. 459
OTHER RECOVERY ISSUES
P. 461
ASSESSMENT QUESTIONS
P. 464
LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATIONS
P. 473
TYPES OF COMPUTER CRIME
P. 473
EXAMPLES OF COMPUTER CRIME
P. 475
LAW
P. 477
EXAMPLE: THE UNITED STATES
P. 477
COMMON LAW SYSTEM CATEGORIES
P. 478
COMPUTER SECURITY, PRIVACY AND CRIME LAWS
P. 489
INVESTIGATION
P. 496
COMPUTER INVESTIGATION ISSUES
P. 496
EXPORT ISSUES AND TECHNOLOGY
P. 502
LIABILITY
P. 502
ETHICS
P. 504
(ISC)2 CODE OF ETHICS
P. 506
THE COMPUTER ETHICS INSTITUTE S TEN COMMANDMENTS OF COMPUTER ETHICS P.
506
THE INTERNET ARCHITECTURE BOARD (IAB) ETHICS AND THE INTERNET (RFC 1087)
P. 507
THE U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES CODE OF FAIR
INFORMATION PRACTICES P. 507
THE ORGANIZATION FOR ECONOMIC COOPERATION AND DEVELOPMENT (OECD) P. 508
ASSESSMENT QUESTIONS
P. 510
PHYSICAL (ENVIRONMENTAL) SECURITY
P. 517
THREATS TO PHYSICAL SECURITY
P. 518
CONTROLS FOR PHYSICAL SECURITY
P. 520
ADMINISTRATIVE CONTROLS
P. 520
ENVIRONMENTAL AND LIFE SAFETY CONTROLS
P. 524
PHYSICAL AND TECHNICAL CONTROLS
P. 534
ASSESSMENT QUESTIONS
P. 550
THE CERTIFICATION AND ACCREDITATION PROFESSIONAL (CAP) CREDENTIAL P. 557
UNDERSTANDING CERTIFICATION AND ACCREDITATION
P. 559
SYSTEM AUTHORIZATION
P. 559
A SELECT HISTORY OF SYSTEMS AUTHORIZATION
P. 560
MORE AND MORE STANDARDS
P. 572
WHAT IS CERTIFICATION AND ACCREDITATION?
P. 572
NIST C&A; DOCUMENTS
P. 573
C&A; ROLES AND RESPONSIBILITIES
P. 573
C&A; PHASES
P. 577
DIACAP PHASES
P. 578
ASSESSMENT QUESTIONS
P. 580
IMAGE 10
INITIATION OF THE SYSTEM AUTHORIZATION PROCESS
P. 585
SECURITY CATEGORIZATION
P. 586
IDENTIFICATION OF INFORMATION TYPES
P. 588
POTENTIAL HARMFUL IMPACT LEVELS
P. 589
ASSIGNMENT OF IMPACT LEVEL SCORES
P. 590
ASSIGNMENT OF SYSTEM IMPACT LEVEL
P. 592
INITIAL RISK ESTIMATION
P. 593
THREAT-SOURCE IDENTIFICATION
P. 594
THREAT LIKELIHOOD OF OCCURRENCE
P. 597
ANALYZING FOR VULNERABILITIES
P. 597
SYSTEM ACCREDITATION BOUNDARY
P. 601
LEGAL AND REGULATORY REQUIREMENTS
P. 603
SELECTION OF SECURITY CONTROLS
P. 603
THE CONTROL SECTION
P. 606
THE SUPPLEMENTAL GUIDANCE SECTION
P. 606
THE CONTROL ENHANCEMENTS SECTION
P. 606
ASSURANCE
P. 607
COMMON AND SYSTEM-SPECIFIC SECURITY CONTROLS
P. 608
SECURITY CONTROLS AND THE MANAGEMENT OF ORGANIZATIONAL RISK P. 608
DOCUMENTING SECURITY CONTROLS IN THE SYSTEM SECURITY PLAN
P. 610
ASSESSMENT QUESTIONS
P. 613
THE CERTIFICATION PHASE
P. 621
SECURITY CONTROL ASSESSMENT
P. 622
PREPARE FOR THE ASSESSMENT
P. 622
CONDUCT THE SECURITY ASSESSMENT
P. 624
PREPARE THE SECURITY ASSESSMENT REPORT
P. 624
SECURITY CERTIFICATION DOCUMENTATION
P. 625
PROVIDE THE FINDINGS AND RECOMMENDATIONS
P. 625
UPDATE THE SYSTEM SECURITY PLAN
P. 625
PREPARE THE PLAN OF ACTION
P. 626
ASSEMBLE THE ACCREDITATION PACKAGE
P. 626
DITSCAP CERTIFICATION PHASES
P. 627
DEFINITION
P. 627
THE SYSTEM SECURITY AUTHORIZATION AGREEMENT (SSAA)
P. 630
SSAA OUTLINE
P. 630
SSAA ADDITIONAL MATERIAL
P. 632
THE REQUIREMENTS TRACEABILITY MATRIX (RTM)
P. 633
VERIFICATION
P. 635
KEY DITSCAP ROLES
P. 638
DIACAP CERTIFICATION PHASES
P. 639
END OF THE CERTIFICATION PHASE
P. 640
IMAGE 11
ASSESSMENT QUESTIONS
P. 641
THE ACCREDITATION PHASE
P. 645
SECURITY ACCREDITATION DECISION
P. 646
FINAL RISK ASSESSMENT
P. 646
ACCREDITATION DECISION
P. 647
SECURITY ACCREDITATION DOCUMENTATION
P. 648
ACCREDITATION PACKAGE TRANSMISSION
P. 648
SYSTEM SECURITY PLAN UPDATE
P. 649
DITSCAP ACCREDITATION PHASES
P. 649
VALIDATION
P. 649
POST ACCREDITATION
P. 653
DIACAP ACCREDITATION PHASES
P. 656
END OF THE ACCREDITATION PHASE
P. 657
ASSESSMENT QUESTIONS
P. 658
CONTINUOUS MONITORING PROCESS
P. 663
CONTINUOUS MONITORING
P. 664
MONITORING SECURITY CONTROLS
P. 665
CONFIGURATION MANAGEMENT AND CONTROL
P. 669
ENVIRONMENT MONITORING
P. 670
DOCUMENTATION AND REPORTING
P. 671
ASSESSMENT QUESTIONS
P. 673
ANSWERS TO ASSESSMENT QUESTIONS
P. 681
GLOSSARY OF TERMS AND ACRONYMS
P. 881
THE INFORMATION SYSTEM SECURITY ARCHITECTURE PROFESSIONAL (ISSAP)
CERTIFICATION P. 945
THE INFORMATION SYSTEM SECURITY ENGINEERING PROFESSIONAL (ISSEP)
CERTIFICATION P. 951
THE INFORMATION SYSTEM SECURITY MANAGEMENT PROFESSIONAL (ISSMP)
CERTIFICATION P. 1039
SECURITY CONTROL CATALOG
P. 1075
CONTROL BASELINES
P. 1185
INDEX
P. 1193
TABLE OF CONTENTS PROVIDED BY BLACKWELL S BOOK SERVICES AND R.R. BOWKER.
USED WITH PERMISSION.
|
any_adam_object | 1 |
author | Krutz, Ronald L. Vines, Russell Dean |
author_facet | Krutz, Ronald L. Vines, Russell Dean |
author_role | aut aut |
author_sort | Krutz, Ronald L. |
author_variant | r l k rl rlk r d v rd rdv |
building | Verbundindex |
bvnumber | BV036800230 |
ctrlnum | (OCoLC)836309334 (DE-599)GBV513814191 |
dewey-full | 004.62 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science 005 - Computer programming, programs, data, security |
dewey-raw | 004.62 005.8 |
dewey-search | 004.62 005.8 |
dewey-sort | 14.62 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01780nam a2200433 c 4500</leader><controlfield tag="001">BV036800230</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">101126s2007 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470007923</subfield><subfield code="c">cloth/cdrom</subfield><subfield code="9">0-470-00792-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470007921</subfield><subfield code="c">cloth/cdrom</subfield><subfield code="9">978-0-470-00792-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)836309334</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV513814191</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.62</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Krutz, Ronald L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The CISSP and CAP prep guide</subfield><subfield code="b">platinum edition</subfield><subfield code="c">Ronald L. Krutz ; Russell Dean Vines</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXIV, 1236 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="e">1 CD-ROM</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Wiley technology publishing : Timely, practical, reliable</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing personnel</subfield><subfield code="a">Certification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="a">Study guides</subfield><subfield code="a">Examinations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="a">Study guides</subfield><subfield code="a">Security measures</subfield><subfield code="a">Examinations</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">CISSP</subfield><subfield code="0">(DE-588)4744965-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">CAP</subfield><subfield code="0">(DE-588)4113203-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">CISSP</subfield><subfield code="0">(DE-588)4744965-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">CAP</subfield><subfield code="0">(DE-588)4113203-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vines, Russell Dean</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip0616/2006020712.html</subfield><subfield code="z">lizenzfrei</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020716431&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020716431</subfield></datafield></record></collection> |
id | DE-604.BV036800230 |
illustrated | Illustrated |
indexdate | 2024-07-09T22:48:31Z |
institution | BVB |
isbn | 0470007923 9780470007921 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020716431 |
oclc_num | 836309334 |
open_access_boolean | |
owner | DE-522 |
owner_facet | DE-522 |
physical | XXXIV, 1236 S. graph. Darst. 1 CD-ROM |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Wiley |
record_format | marc |
series2 | Wiley technology publishing : Timely, practical, reliable |
spelling | Krutz, Ronald L. Verfasser aut The CISSP and CAP prep guide platinum edition Ronald L. Krutz ; Russell Dean Vines Indianapolis, Ind. Wiley 2007 XXXIV, 1236 S. graph. Darst. 1 CD-ROM txt rdacontent n rdamedia nc rdacarrier Wiley technology publishing : Timely, practical, reliable Electronic data processing personnel Certification Computer networks Study guides Examinations Computer networks Study guides Security measures Examinations CISSP (DE-588)4744965-2 gnd rswk-swf CAP (DE-588)4113203-8 gnd rswk-swf CISSP (DE-588)4744965-2 s CAP (DE-588)4113203-8 s DE-604 Vines, Russell Dean Verfasser aut http://www.loc.gov/catdir/toc/ecip0616/2006020712.html lizenzfrei Inhaltsverzeichnis GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020716431&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Krutz, Ronald L. Vines, Russell Dean The CISSP and CAP prep guide platinum edition Electronic data processing personnel Certification Computer networks Study guides Examinations Computer networks Study guides Security measures Examinations CISSP (DE-588)4744965-2 gnd CAP (DE-588)4113203-8 gnd |
subject_GND | (DE-588)4744965-2 (DE-588)4113203-8 |
title | The CISSP and CAP prep guide platinum edition |
title_auth | The CISSP and CAP prep guide platinum edition |
title_exact_search | The CISSP and CAP prep guide platinum edition |
title_full | The CISSP and CAP prep guide platinum edition Ronald L. Krutz ; Russell Dean Vines |
title_fullStr | The CISSP and CAP prep guide platinum edition Ronald L. Krutz ; Russell Dean Vines |
title_full_unstemmed | The CISSP and CAP prep guide platinum edition Ronald L. Krutz ; Russell Dean Vines |
title_short | The CISSP and CAP prep guide |
title_sort | the cissp and cap prep guide platinum edition |
title_sub | platinum edition |
topic | Electronic data processing personnel Certification Computer networks Study guides Examinations Computer networks Study guides Security measures Examinations CISSP (DE-588)4744965-2 gnd CAP (DE-588)4113203-8 gnd |
topic_facet | Electronic data processing personnel Certification Computer networks Study guides Examinations Computer networks Study guides Security measures Examinations CISSP CAP |
url | http://www.loc.gov/catdir/toc/ecip0616/2006020712.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020716431&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT krutzronaldl thecisspandcapprepguideplatinumedition AT vinesrusselldean thecisspandcapprepguideplatinumedition |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis