Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Author biography Chapter 1: Domain 1: Security risk management
Abstract Introduction Cornerstone Information Security Concepts Legal and Regulatory Issues Security and Third Parties Ethics Information Security Governance Access Control Defensive Categories and Types Risk Analysis Types of Attackers Summary of Exam Objectives Top Five Toughest Questions Answers
Chapter 2: Domain 2: Asset security
Abstract Introduction Classifying Data Ownership Memory and Remanence Data Destruction Determining Data Security Controls Summary of Exam Objectives Top Five Toughest Questions Answers
Chapter 3: Domain 3: Security engineering
Abstract Introduction Security Models Secure System Design Concepts Secure Hardware Architecture Secure Operating System and Software Architecture Virtualization and Distributed Computing System Vulnerabilities, Threats, and Countermeasures Cornerstone Cryptographic Concepts Types of Cryptography Cryptographic Attacks Implementing Cryptography Perimeter Defenses Site Selection, Design, and Configuration System Defenses Environmental Controls Summary of Exam Objectives Top Five Toughest Questions Answers
Chapter 4: Domain 4: Communication and network security
Abstract Introduction Network Architecture and Design Secure Network Devices and Protocols Secure Communications Summary of Exam Objectives Top Five Toughest Questions Answers
Chapter 5: Domain 5: Identity and access management (controlling access and managing identity)
Abstract Introduction Authentication Methods Access Control Technologies Access Control Models Summary of Exam Objectives Top Five Toughest Questions Answers
Chapter 6: Domain 6: Security assessment and testing
Abstract Introduction Assessing Access Control Software Testing Methods Summary of Exam Objectives Top Five Toughest Questions Answers
Chapter 7: Domain 7: Security operations
Abstract Introduction Administrative Security Forensics Incident Response Management Operational Preventive and Detective Controls Asset Management Continuity of Operations BCP and DRP overview and process Developing a BCP/DRP Backups and Availability DRP Testing, Training, and Awareness Continued BCP/DRP Maintenance Specific BCP/DRP Frameworks Summary of Exam Objectives Top Five Toughest Questions Answers
Chapter 8: Domain 8: Software development security
Abstract Introduction Programming Concepts Application Development Methods Databases Object-Oriented Programming Assessing the Effectiveness of Software Security Summary of Exam Objectives Top Five Toughest Questions Answers
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion