CISSP:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
McGraw-Hill/Osborne
2002
|
Schriftenreihe: | Mike Meyers' certification passport
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes index. - "Your ticket to exam success"--Cover |
Beschreibung: | xxiii, 422 p. Ill., graph. Darst. 23 cm |
ISBN: | 0072225785 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040394234 | ||
003 | DE-604 | ||
005 | 20120831 | ||
007 | t | ||
008 | 120830s2002 ad|| |||| 00||| eng d | ||
020 | |a 0072225785 |9 0-07-222578-5 | ||
035 | |a (OCoLC)812252794 | ||
035 | |a (DE-599)BVBBV040394234 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Harris, Shon |e Verfasser |4 aut | |
245 | 1 | 0 | |a CISSP |c Shon Harris ; Mike Meyers |
264 | 1 | |a New York [u.a.] |b McGraw-Hill/Osborne |c 2002 | |
300 | |a xxiii, 422 p. |b Ill., graph. Darst. |c 23 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Mike Meyers' certification passport | |
500 | |a Includes index. - "Your ticket to exam success"--Cover | ||
650 | 0 | 7 | |a CISSP |0 (DE-588)4744965-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a A+-Zertifikat |0 (DE-588)4656690-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a CISSP |0 (DE-588)4744965-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a A+-Zertifikat |0 (DE-588)4656690-9 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Meyers, Michael |d 1961- |e Verfasser |0 (DE-588)138543070 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025247510&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025247510 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804149442369028096 |
---|---|
adam_text | Check-In
.......................................... xvii
Introduction
....................................... xxi
Security Management Practices
Objective
1.01
Objectiveis
Management Responsibilities
Risk Management
Risk Analysis
Possible Threats
Security Control Types
Calculating Risk
Objectiveis
Objective
1.05
1
2
З
4
5
7
10
10
Quantitative Versus Qualitative Approaches
.............
Dealing with Risk
........................................ 13
Countermeasure Selection
................................ 13
ДЯСТІіТЯ
Security Policies and their Supporting
Counterparts
........................................... 14
Security Policy
.......................................... 15
Standards
..........................
Baselines
..........................
Procedures
.........................
Guidelines
.........................
ДЯЯІЇЯ
Roles and Responsibilities
Data Owner
........................
Data Custodian
.....................
User
..............................
Security Auditor
.....................
Information Classification
.
Objective
1.08
15
15
16
16
17
17
17
17
18
18
Military Versus Commercial Classifications
................... 19
ЕЯ
Employee Management
....................... 21
Operational Administrative Controls
......................... 22
CHECKPOINT
.......................................... 23
Review Questions
....................................... 24
Review Answers
.................
VI
MIKE MEYERS CISSP
CERTIFICATION PASSPORT
Objective
2.01
Access Control
..................................... 29
Identification and Authentication
.............. 30
Definitions
............................................. 30
Three Steps to Access Control
............................. 31
Authentication
.......................................... 31
Biometrics
........................................ 32
Passwords
........................................ 35
Cognitive Password
................................ 36
One-Time Password
................................ 37
Cryptographic Keys
................................. 39
Passphrase ....................................... 39
Memory Cards
.................................... 39
Smart Cards
...................................... 40
Authorization
........................................... 40
ШЯДГЧ
Single Sign-On Technologies
.......... 41
Directory Services
....................................... 42
Kerberos ............................................... 42
SESAME
............................................... 45
Thin Clients
............................................ 45
23ЅИЕ]
Access Control Models and Techniques
46
DAC
.................................................. 46
MAC
.................................................. 47
RBAC
................................................. 48
Access Control Techniques
................................ 49
Restricted Interfaces
............................... 50
Capability Table and ACLs
........................... 50
Content-Dependent Access Control
.................... 51
Other Access Techniques
............................ 52
ИЗ
Access Control Administration
............. 52
Centralized Access Control Administration
.................... 52
RADIUS
.......................................... 53
TACACS
......................................... 54
Diameter
......................................... 54
Decentralized Access Control Administration
.................. 55
ffffflwia Intrusion Detection System
............. 55
Network-Based and Host-Based
............................ 55
Signature-Based and Behavior-Based
........................ 57
Downfalls of IDS
........................................ 58
чгтдД
Unauthorized Access Control and Attacks
58
Unauthorized Disclosure of Information
...................... 59
Emanation Security
...................................... 60
Attack Types
...........................................
60
Penetration Testing
...................................... 62
Contents
Vil
CHECKPOINT .......................................... 63
Review
Questions .......................................
65
Review
Answers ........................................
67
о
Security Models and Architecture
.................... 69
ЕЗШ^ВП
System Components
.......................... 70
Central Processing Unit
................................... 70
Storage and Memory Types
................................ 73
Virtual Memory
.................................... 75
Data Access Storage
..................................... 77
Processing Instructions
................................... 77
Operating States
........................................ 78
ЩИЯДЕТЧ
Operation System Security Mechanisms
........ 78
Process Isolation
........................................ 79
Protection Rings
......................................... 79
Virtual Machine
......................................... 81
Trusted Computing Base
.................................. 81
Reference Monitor and Security Kernel
...................... 82
inÍiETanracnifl
Security Models
............................. 83
The Different Models
..................................... 83
State Machine Models
.............................. 84
Bell-LaPadula Model
............................... 84
Biba
............................................. 86
Clark-Wilson Model
................................ 88
Non-Interference Model
............................. 88
Access Control Matrix Model
......................... 89
Information Flow Model
............................. 89
Brewer and Nash Model
............................ 90
Graham-Denning and Harrison-Ruzzo-Ullman Models
..... 90
ItlüffllffiiiliÏI
Security Evaluation Criteria
................... 92
Security Evaluations
..................................... 93
Trusted Computer System Evaluation Criteria
............ 93
Rainbow Series
.................................... 94
Information Technology Security Evaluation Criteria
....... 95
Common Criteria
................................... 95
Certification Versus Accreditation
........................... 97
CHECKPOINT
99
Review Questions
....................................... 100
Review Answers
........................................ 102
4
Physical Security
.................................. 105
ГШШИДіП
Controls Pertaining to Physical Security
106
Facility Location
......................................... 107
Facility Construction
..................................... 109
VIU
MIKE MEYERS CISSP
CERTIFICATION
PASSPORT
Computing
Area
......................................... 112
Hardware Backups ....................................... 113
BTOffifflJCTfl
Electrical
Power
and Environmental Issues
114
UPS
...................................................
H4
Power Interference
...................................... 115
Environmental Considerations
.............................. 118
Ventilation
............................................. 118
Water, Steam, and Gas
................................... 119
ftfflJRTffitfiEI
Fire Detection and Suppression
................ 119
Fire Prevention
.......................................... 120
Fire Detection
........................................... 120
Fire Types
.............................................. 122
Fire Suppression
........................................ 122
Halon
................................................. 123
Fire Extinguishing Issues
.................................. 123
Water Sprinklers
........................................ 124
Emergency Response
..................................... 125
ППВШВПГП
Perimeter Security
........................... 125
Lock Types
............................................. 126
Facility Access
.......................................... 127
Entrance Protection
...................................... 128
Fencing
................................................ 129
Lighting
............................................... 130
Surveillance Devices
..................................... 130
Intrusion Detection Systems
............................... 131
CHECKPOINT
.......................................... 133
Review Questions
....................................... 134
Review Answers
........................................ 136
Э
Telecommunications and Networking Security
........... 139
Objective
5.01
TCP/IP Suite
................................. 140
Internet Protocol (IP)
..................................... 143
Networks
.............................................. 143
Intranets and
Extranets
................................... 144
^дгпдлчм
Cabling and Data Transmission Types
145
Coaxial Cable
........................................... 145
Twisted-Pair Cable
....................................... 146
Fiber
.................................................. 147
Cable Issues
............................................ 148
Fire Ratings
............................................ 149
Broadband and Baseband
................................. 149
Signals
................................................ 150
Asynchronous and Synchronous
............................ 151
Transmission Methods
................................... 151
Contents
IX
Objective
5.03
LAN Technologies
152
Network Topologies
...................................... 152
Media Access Technologies
............................... 154
Ethernet
......................................... 154
Token Passing
..................................... 155
Polling
........................................... 156
Protocols
.............................................. 156
Address Resolution Protocol
(ARP)
..................... 156
Reverse Address Resolution Protocol (RARP)
............ 157
Boot Protocol
..................................... 158
Internet Control Message Protocol (ICMP)
............... 159
Other TCP/IP Protocols
.............................. 159
ffOTHETiľl
Networking
Devicesand
Services
.... 160
Repeater
............................................... 160
Bridge
................................................. 161
Switches
.............................................. 161
VLAN
............................................ 162
Router
................................................. 162
Brouters
............................................... 164
Gateway
............................................... 164
Summary of Devices
..................................... 165
Firewalls
............................................... 166
Packet Filtering
.................................... 166
Proxy Firewalls
.................................... 167
Stateful Firewalls
.................................. 169
Firewall Architecture
..................................... 170
Firewall Administration
............................. 173
Remote Connectivity
..................................... 174
PPP
............................................. 174
SLIP
............................................. 174
PAP
............................................. 175
CHAP
............................................ 175
ΕΑΡ
............................................. 175
VPN
.................................................. 176
PPTP
............................................ 177
L2TP
............................................ 177
IPSec
............................................ 177
Network Services
........................................ 178
DNS
............................................. 178
NAT
............................................. 179
WflHľfH
Telecommunications Protocols and Devices
180
FDDI
.................................................. 181
SONET
................................................ 181
Dedicated Link
.......................................... 182
CSU/DSU
.............................................. 184
X MIKE MEYERS CISSP CERTIFICATION PASSPORT
S/WAN
................................................ 184
ISDN
.................................................. 184
DSL
................................................... 185
Cable Modems
.......................................... 186
WAN Switching
......................................... 186
Frame Relay
............................................ 187
X.25
.................................................. 188
ATM
.................................................. 188
Quality of Service
........................................ 189
SMDS
................................................. 189
SDLC
.................................................. 190
HDLC
................................................. 190
Multiservice Access Technologies
.......................... 190
üffflECm Remote
Access Methods and Technologies
191
Remote Access
......................................... 191
Wireless Technology
..................................... 193
Spread Spectrum
.................................. 193
WAP
............................................ 194
Access Points
..................................... 195
SSID
............................................ 196
OSA
and SKA
..................................... 196
Cell Phone Cloning
....................................... 198
PBX Threats
............................................ 198
ВПГНЗГЯ
Fault Tolerance Mechanisms
199
RAID
.................................................. 200
Clustering
.............................................. 200
Backing Up
............................................. 200
CHECKPOINT
.......................................... 201
Review Questions
....................................... 202
Review Answers
........................................ 205
0
Cryptography
..................................... 209
Objective
6.01
Cryptography Definitions
...................... 210
Definitions
............................................. 210
Keys and Text
........................................... 211
Keyspace .............................................. 212
Strength of Cryptosystem
................................. 213
Attacks
................................................ 214
Spy-Like Ciphers
........................................ 215
Steganography
.......................................... 215
ДиЯЯТгЗ
Cipher Types
.......................... 216
Kerckhoff s Principle
..................................... 217
Key Escrow
............................................. 218
Substitution Cipher
...................................... 218
Objective
6.04
Contents
XI
Transposition
Cipher
..................................... 219
Block Cipher
............................................ 220
Stream Cipher
.......................................... 221
Symmetric Cryptography
.................................. 223
Asymmetric Cryptography
................................. 225
Hybrid Approach
............................. 227
Key Management
........................................ 228
Data Encryption
......................................... 229
Security Goals
.......................................... 230
Types of Symmetric Algorithms
............................. 231
DES
............................................. 231
Triple-DES (3DES)
.................................. 233
Advanced Encryption Standard (AES)
................... 233
Other Symmetric Algorithms
............................... 234
Asymmetrical Algorithms
................................. 234
Diffie-Hellman Key Exchange
......................... 235
El Gamal
......................................... 236
Elliptic Curve
CryptoSystems (ECC)
..................... 236
Message Integrity and Digital Signatures
....... 236
Message Integrity
....................................... 236
One-Way Hash
.................................... 237
Attacks on Hashing Functions
........................ 238
Hashing Algorithms
................................ 240
Message Authentication Code
............................. 240
Electronic Signing
....................................... 242
DSS
............................................. 243
Cryptography Applications
.................... 244
Public Key Infrastructure
.................................. 244
Certificate Authority (CA)
............................ 244
Registration Authority
.............................. 245
Certificate Revocation List (CRL)
...................... 245
Components of PKI
................................. 246
PKI Steps
......................................... 247
One-Time Pad
........................................... 248
Encryption at Different Layers
.............................. 250
Cryptographic Protocols
...................... 251
Privacy-Enhanced Mail
(РЕМ)
.............................. 252
Message Security Protocol (MSP)
........................... 252
Pretty Good Privacy (PGP)
................................. 252
Internet Security
........................................ 253
Secure Hypertext Transfer Protocol (S-HTTP)
............ 253
HTTPS
........................................... 254
Secure Sockets Layer (SSL)
.......................... 254
S/MIME
......................................... 255
SSH2
............................................ 255
Objective
6.05
Objective
6.06
Obiective
6.07
ХІІ
MIKE MEYERS CISSP
CERTIFICATION
PASSPORT
SET
............................................. 256
IPSec
............................................ 257
Other Security Technologies
......................... 261
Attacks
..................................... 261
Ciphertext-Only Attack
.................................... 262
Known-Plaintext Attack
................................... 262
Chosen-Plaintext Attack
.................................. 262
Adaptive Chosen-Plaintext Attack
........................... 263
Chosen-Ciphertext Attack
................................. 263
Adaptive Chosen-Ciphertext Attack
......................... 263
Man-in-the-Middle Attack
................................. 263
Algebraic Attack
........................................ 264
Analytic Attack
.......................................... 264
CHECKPOINT
.......................................... 264
Review Questions
....................................... 266
Review Answers
........................................ 268
I Disaster Recovery and Business Continuity
............ 271
Objective
7.01
Disaster Recovery versus
Business Continuity
.................................... 272
Project Initiation Phase
....................... 274
Business Impact Analysis
..................... 275
Possible Threats
............................. 279
Backups and Off-Site Facilities
................ 280
Employees and the Working Environment
..................... 280
Choosing a Software Backup Storage Facility
................. 282
Backup Facility Alternatives
............................... 283
ЕЭШВНЕЭ
DRP and BCP Planning Objectives
285
Emergency Response
..................................... 288
Recovery and Restoration
................................. 289
Documentation
.......................................... 289
Testing and Drills
........................................ 290
Maintenance
........................................... 291
Phase Breakdown
....................................... 292
Prevention
............................................. 292
CHECKPOINT
.......................................... 293
Review Questions
....................................... 294
Review Answers
........................................ 297
0
Law, Investigation, and Ethics
....................... 299
ІіІІНИМШіІІ
Ethics
....................................... 300
(ISC)2
.................................................. 300
Computer Ethics Institute
................................. 301
Internet Activities Board
.................................. 301
Contents XIII
Obiective
8.02
Hacking Methods
............................ 302
Characteristics of an Attacker
.............................. 302
Problems with Prosecuting Attackers
........................ 303
Types of Attacks
........................................ 304
Salami
........................................... 304
Data Diddling
..................................... 304
Excessive Privileges
................................ 304
Password Sniffing
.................................. 305
IP Spoofing
....................................... 305
Dumpster Diving
................................... 305
Wiretapping
...................................... 305
Social Engineering
................................. 306
More Attack Types
....................................... 306
Attack Categories
....................................... 307
Phone Fraud
............................................ 307
ИЯЯИЇІЇЯ
Organization Liabilities and Ramifications
___ 308
Security Principles
....................................... 308
Legal Liability
........................................... 309
Privacy Issues
........................................... 309
Privacy Act of
1974 ................................. 309
Electronic Communications Privacy Act of
1986 .......... 310
Health Insurance Portability and
Accountability Act (HIPAA)
........................ 310
Gramm
Leach Bliley Act of
1999 ...................... 310
Employee Monitoring
............................... 311
Transborder
Information Flow
........................ 312
International Issues
...................................... 312
Я8НЯ:|і!іі
Types of Law
313
Civil Law
............................................... 313
Criminal Law
........................................... 313
Administrative Law
...................................... 314
Federal Policies
......................................... 314
Computer Fraud and Abuse Act of
1986 ................ 314
Economic Espionage Act of
1996 ...................... 314
Federal Sentencing Guidelines of
1991 ................. 315
Intellectual Property Laws
................................. 315
Trade Secret
...................................... 315
Copyright
......................................... 316
Trademark
........................................ 317
Patent
........................................... 317
Software Piracy
......................................... 317
!ІЩД?ГЇЇЯ
Computer Crime Investigation
318
Who Should Investigate?
.................................. 318
Incident Response Plan
................................... 319
Incident Response Team
.................................. 319
Incident Handling
........................................ 320
XIV
MIKE MEYERS CISSP
CERTIFICATION
PASSPORT
Collecting Evidence
...................................... 320
Search and Seizure
...................................... 322
Forensics
.............................................. 323
Admissibility of Evidence
.................................. 324
Evidence Types
......................................... 324
Best Evidence
..................................... 324
Secondary Evidence
................................ 325
Hearsay Evidence
.................................. 325
Enticement and Entrapment
............................... 325
Trial
.................................................. 326
CHECKPOINT
.......................................... 327
Review Questions
....................................... 328
Review Answers
........................................ 331
7
Applications and Systems Development
............... 333
ГШЯГОЯЇТЇТІ
Project Development
......................... 334
Software Lifecycle
....................................... 335
Software Development Models
............................. 336
Project Initiation
................................... 336
Functional Design Analysis and Planning
............... 336
System Design Specifications
........................ 337
Software Development
.............................. 338
Acceptance Testing/Implementation
................... 338
Operations/Maintenance
............................ 339
Disposal
......................................... 339
Software Development Methods
........................... 339
Change Control
......................................... 340
Administrative Controls
................................... 341
Program Language Evolution
............................... 342
ГЇТЛШПЯіТіТІ
Object-Oriented Programming
342
Classes and Objects
................................ 343
Abstraction
....................................... 344
Polymorphism
..................................... 344
Polyinstantiation
........................................ 344
Application Threats
...................................... 345
ППТШЯЯЇТЇЯ
Distributed Computing
347
ORB and
CORBA
......................................... 347
COM and DCOM
........................................ 348
Enterprise Java Bean
..................................... 349
OLE
................................................... 349
ActiveX
................................................ 350
Java Applets
........................................... 350
CGI
................................................... 351
Cookies
................................................ 351
Contents
XV
10
Objective
9.04
Databases
................................... 352
Relational Data Model
.................................... 353
Data Dictionary
.................................... 354
Database Jargon
.................................. 355
Structured Query Language
.......................... 356
Hierarchical Database Model
.............................. 356
Network Database Management System
..................... 356
Distributed Data Model
................................... 356
Object-Oriented Database
................................. 357
Database Interface Languages
............................. 357
Concurrency Issues
...................................... 358
Aggregation and Inference
................................ 359
Data Warehousing
....................................... 361
_________
Data Mining
...................................... 361
Ц].ТтПЕШііД
Artificial Intelligence
362
Expert Systems
......................................... 362
Artificial Neural Network
................................. 363
IfflflWflfETita
Malware .................................... 364
Virus
.................................................. 364
Worms
................................................ 365
Logic Bomb
............................................. 365
Trojan Horse
............................................ 365
Denial of Service
........................................ 366
DDoS
................................................. 366
Smurf Attacks
.......................................... 366
Timing Attacks
.......................................... 367
CHECKPOINT
.......................................... 368
Review Questions
....................................... 369
Review Answers
........................................ 371
Operations Security
................................ 373
Objective
10 01
Operations Controls
......................... 374
Due Care
.............................................. 375
Administrative Control
.................................... 375
Separation of Duties
................................ 376
Job Rotation
...................................... 376
Least Privilege and Need-to-Know
..................... 377
Mandatory Vacations
............................... 377
Clipping Levels
.................................... 378
Control Categories
....................................... 378
ЯСТЯТЇТЇЯ
Configuration Management and
Media Control
......................................... 380
Media Controls
......................................... 381
Input/Output Data Controls
................................ 383
XVI MIKE
MEYERS CISSP CERTIFICATION PASSPORT
nïïffiffffTîTÎÎl
Reacting to Failures and Recovering
....... 383
Trusted Recovery
........................................ 384
Facsimile Security
....................................... 385
Operational Responsibilities
............................... 386
Unusual or Unexplained Occurrences
.................. 386
Deviations from Standards
........................... 387
Unscheduled Initial Program Loads
.................... 387
Personnel Operators
..................................... 388
1:|;!*ГТ*!ГГј[|д|ј1
Software
Backups
ооУ
Network Availability
..................................... 389
RAID
............................................ 389
Backups
............................................... 391
Contingency Management
........................... 393
CHECKPOINT
.......................................... 393
Review Questions
....................................... 394
Review Answers
........................................ 396
A About the Free Online Practice Exam
................. 397
Mike Meyers Certification Passport
FREE Online Practice Exam Instructions
................... 397
System Requirements
.................................... 397
Technical Support
....................................... 398
В
Career Flight Path
.................................. 399
Career Paths in Security
.................................... 399
Index
............................. .......
|
any_adam_object | 1 |
author | Harris, Shon Meyers, Michael 1961- |
author_GND | (DE-588)138543070 |
author_facet | Harris, Shon Meyers, Michael 1961- |
author_role | aut aut |
author_sort | Harris, Shon |
author_variant | s h sh m m mm |
building | Verbundindex |
bvnumber | BV040394234 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)812252794 (DE-599)BVBBV040394234 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01560nam a2200397 c 4500</leader><controlfield tag="001">BV040394234</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120831 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120830s2002 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0072225785</subfield><subfield code="9">0-07-222578-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)812252794</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040394234</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Harris, Shon</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">CISSP</subfield><subfield code="c">Shon Harris ; Mike Meyers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">McGraw-Hill/Osborne</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiii, 422 p.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">23 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Mike Meyers' certification passport</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - "Your ticket to exam success"--Cover</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">CISSP</subfield><subfield code="0">(DE-588)4744965-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">A+-Zertifikat</subfield><subfield code="0">(DE-588)4656690-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">CISSP</subfield><subfield code="0">(DE-588)4744965-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">A+-Zertifikat</subfield><subfield code="0">(DE-588)4656690-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meyers, Michael</subfield><subfield code="d">1961-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)138543070</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025247510&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025247510</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV040394234 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:23:06Z |
institution | BVB |
isbn | 0072225785 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025247510 |
oclc_num | 812252794 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | xxiii, 422 p. Ill., graph. Darst. 23 cm |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | McGraw-Hill/Osborne |
record_format | marc |
series2 | Mike Meyers' certification passport |
spelling | Harris, Shon Verfasser aut CISSP Shon Harris ; Mike Meyers New York [u.a.] McGraw-Hill/Osborne 2002 xxiii, 422 p. Ill., graph. Darst. 23 cm txt rdacontent n rdamedia nc rdacarrier Mike Meyers' certification passport Includes index. - "Your ticket to exam success"--Cover CISSP (DE-588)4744965-2 gnd rswk-swf A+-Zertifikat (DE-588)4656690-9 gnd rswk-swf CISSP (DE-588)4744965-2 s DE-604 A+-Zertifikat (DE-588)4656690-9 s 1\p DE-604 Meyers, Michael 1961- Verfasser (DE-588)138543070 aut Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025247510&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Harris, Shon Meyers, Michael 1961- CISSP CISSP (DE-588)4744965-2 gnd A+-Zertifikat (DE-588)4656690-9 gnd |
subject_GND | (DE-588)4744965-2 (DE-588)4656690-9 |
title | CISSP |
title_auth | CISSP |
title_exact_search | CISSP |
title_full | CISSP Shon Harris ; Mike Meyers |
title_fullStr | CISSP Shon Harris ; Mike Meyers |
title_full_unstemmed | CISSP Shon Harris ; Mike Meyers |
title_short | CISSP |
title_sort | cissp |
topic | CISSP (DE-588)4744965-2 gnd A+-Zertifikat (DE-588)4656690-9 gnd |
topic_facet | CISSP A+-Zertifikat |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025247510&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT harrisshon cissp AT meyersmichael cissp |