Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Contents Title Copyright Dedication Acknowledgments About the Authors Introduction Assessment Test Chapter 1: Access Control
Access Control Overview Identification and Authentication Techniques Access Control Techniques Authorization Mechanisms Identity and Access Provisioning Life Cycle Summary Exam Essentials Written Lab Review Questions
Chapter 2: Access Control Attacks and Monitoring
Understanding Access Control Attacks Preventing Access Control Attacks Summary Exam Essentials Written Lab Review Questions
Chapter 3: Secure Network Architecture and Securing Network Components
OSI Model Secure Network Components Cabling, Wireless, Topology, and Communications Technology Summary Exam Essentials Written Lab Review Questions
Chapter 4: Secure Communications and Network Attacks
Network and Protocol Security Mechanisms Virtual Private Network Remote Access Security Management Network Address Translation Switching Technologies WAN Technologies Virtualization Miscellaneous Security Control Characteristics Manage Email Security Secure Voice Communications Security Boundaries Network Attacks and Countermeasures Summary Exam Essentials Written Lab Review Questions
Chapter 5: Security Governance Concepts, Principles, and Policies
Security Management Planning Security Governance Security Roles and Responsibilities Protection Mechanisms Privacy Requirements Compliance Control Frameworks: Planning to Plan Security Management Concepts and Principles Develop and Implement Security Policy Change Control/Management Data Classification Summary Exam Essentials Written Lab Review Questions
Chapter 6: Risk and Personnel Management
Manage Third-Party Governance Risk Management Manage Personnel Security Develop and Manage Security Education, Training, and Awareness Manage the Security Function Summary Exam Essentials Written Lab Review Questions
Chapter 7: Software Development Security
Application Issues Databases and Data Warehousing Data/Information Storage Knowledge-Based Systems Systems Development Controls Summary Exam Essentials Written Lab Review Questions
Chapter 8: Malicious Code and Application Attacks
Malicious Code Password Attacks Application Attacks Web Application Security Reconnaissance Attacks Masquerading Attacks Summary Exam Essentials Written Lab Review Questions
Chapter 9: Cryptography and Symmetric Key Algorithms
Historical Milestones in Cryptography Cryptographic Basics Modern Cryptography Symmetric Cryptography Cryptographic Life Cycle Summary Exam Essentials Written Lab Review Questions
Chapter 10: PKI and Cryptographic Applications
Asymmetric Cryptography Hash Functions Digital Signatures Public Key Infrastructure Asymmetric Key Management Applied Cryptography Cryptographic Attacks Summary Exam Essentials Written Lab Review Questions
Chapter 11: Principles of Security Models, Design, and Capabilities
Understand the Fundamental Concepts of Security Models Objects and Subjects Understand the Components of Information Systems Security Evaluation Models Understand Security Capabilities Of Information Systems Summary Exam Essentials Written Lab Review Questions
Chapter 12: Security Architecture Vulnerabilities, Threats, and Countermeasures
Computer Architecture Avoiding Single Points of Failure Distributed Architecture Security Protection Mechanisms Common Flaws and Security Issues Summary Exam Essentials Written Lab Review Questions
Chapter 13: Security Operations
Security Operations Concepts Resource Protection Patch and Vulnerability Management Change and Configuration Management Security Audits and Reviews Summary Exam Essentials Written Lab Review Questions
Chapter 14: Incident Management
Managing Incident Response Implement Preventive Measures Against Attacks Understand System Resilience and Fault Tolerance Summary Exam Essentials Written Lab Review Questions
Chapter 15: Business Continuity Planning
Planning for Business Continuity Project Scope and Planning Business Impact Assessment Continuity Planning BCP Documentation Summary Exam Essentials Written Lab Review Questions
Chapter 16: Disaster Recovery Planning
The Nature of Disaster Recovery Strategy Recovery Plan Development Training and Documentation Testing and Maintenance Summary Exam Essentials Written Lab Review Questions
Chapter 17: Laws, Regulations, and Compliance
Categories of Laws Laws Compliance Contracting and Procurement Summary Exam Essentials Written Lab Review Questions
Chapter 18: Incidents and Ethics
Investigations Major Categories of Computer Crime Incident Handling Ethics Summary Exam Essentials Written Lab Review Questions
Chapter 19: Physical Security Requirements
Site and Facility Design Considerations Forms of Physical Access Controls Technical Controls Environment and Life Safety Equipment Failure Privacy Responsibilities and Legal Requirements Summary Exam Essentials Written Lab Review Questions
Appendix A: Answers to Review Questions Appendix B: Answers to Written Labs Appendix C: About the Additional Study Tools Index Free Online Study Tools
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion