7 Part 3: The Part of Tens Chapter 11: Ten Ways to Prepare for the Exam Know Your Learning Style Get a Networking Certification First Register Now Make a 60-Day Study Plan Get Organized and Read Join a Study Group Take Practice Exams Take a CISSP Training Seminar Adopt an Exam-Taking Strategy Take a Breather Chapter 12: Ten Test-Day Tips Get a Good Night’s Rest Dress Comfortably Eat a Good Meal Arrive Early Bring Approved Identification Bring Snacks and Drinks Bring Prescription and Over-the-Counter Medications Leave Your Mobile Devices Behind Take Frequent Breaks Guess — As a Last Resort
8 Glossary
9 Index
10 About the Authors
11 Connect with Dummies
12 End User License Agreement
1 Chapter 3 TABLE 3-1 Data Processing Continuity Planning Site Comparison
2 Chapter 4TABLE 4-1 Typical Data Handling GuidelinesTABLE 4-2 Example Facilities Classification Policy
3 Chapter 5TABLE 5-1 An Access Matrix ExampleTABLE 5-2 TCSEC ClassesTABLE 5-3 ITSEC Functionality (F) Classes and Evaluation (E) Levels Mapped to TC...TABLE 5-4 The Common CriteriaTABLE 5-5 General Fencing Height RequirementsTABLE 5-6 Fire Classes and Suppression/Extinguishing MethodsTABLE 5-7 Electrical Anomalies
4 Chapter 6TABLE 6-1 Connection-Oriented and Connectionless-Oriented ProtocolsTABLE 6-2 Bit Position Values in an IPv4 AddressTABLE 6-3 Binary Notation of Octet ValuesTABLE 6-4 IP Address ClassesTABLE 6-5 Decimal, Hexadecimal, and Binary NotationTABLE 6-6 Wireless LAN StandardsTABLE 6-7 Circuit Switching versus Packet SwitchingTABLE 6-8 Common Telecommunications CircuitsTABLE 6-9 Common Twisted-Pair Cable CategoriesTABLE 6-10 Cable Types and Characteristics
5 Chapter 7TABLE 7-1 Generally Accepted Standards for Biometric SystemsTABLE 7-2 General Characteristics of Finger Scan and Hand Geometry SystemsTABLE 7-3 General Characteristics of Retina and Iris Pattern SystemsTABLE 7-4 General Characteristics of Voice Recognition and Signature Dynamics Sy...
1 Chapter 2FIGURE 2-1: Make your own personal business cards.
2 Chapter 3FIGURE 3-1: The CIA triad. FIGURE 3-2: Attack tree for a mobile banking application.
3 Chapter 4FIGURE 4-1: Example document marking.
4 Chapter 5FIGURE 5-1: Attack tree for a mobile banking application. FIGURE 5-2: AWS shared responsibility matrix. FIGURE 5-3: Azure shared responsibility matrix. FIGURE 5-4: Protection rings provide layers of defense in a system. FIGURE 5-5: Encryption and decryption. FIGURE 5-6: Link encryption. FIGURE 5-7: Sending a message using asymmetric key cryptography. FIGURE 5-8: Verifying message authenticity using asymmetric key cryptography. FIGURE 5-9: Encrypting and signing a message using asymmetric key cryptography....FIGURE 5-10: Diffie-Hellman key exchange is used to generate a symmetric key fo...FIGURE 5-11: A fire needs these three elements to burn.
5 Chapter 6FIGURE 6-1: The seven layers of the OSI model. FIGURE 6-2: Data encapsulation in the OSI model. FIGURE 6-3: The TCP three-way handshake. FIGURE 6-4: The LLC and MAC sublayers. FIGURE 6-5: Comparing the OSI model and the TCP/IP Model.
6 Chapter 7FIGURE 7-1: Use CER to compare FAR and FRR. FIGURE 7-2: Typical identity and access management system architecture. FIGURE 7-3: Role-based access control. FIGURE 7-4: Kerberos: Login initiation (step 1). FIGURE 7-5: Kerberos: Client/TGS session key and TGT generation (step 2). FIGURE 7-6: Kerberos: Login completion (step 3). FIGURE 7-7: Kerberos: Requesting services (step 4). FIGURE 7-8: Kerberos: Client/Server session key and service ticket generation (...FIGURE 7-9: Kerberos: Decrypt Client/Server session key (step 6). FIGURE 7-10: Kerberos: Client/server communications (step 7).
7 Chapter 10FIGURE 10-1: The DevOps life cycle process. FIGURE 10-2: The concept of Shift Security Left. FIGURE 10-3: An example of software library attributions for a software applica...
1 Cover
2 Title Page
3 Copyright
4 Table of Contents
5 Begin Reading
6 Glossary
7 Index
8 About the Authors
1 i
2 iii
3 iv
4 1
5 2
6 3
7 4
8 5
9 7
10 8
11 9
12 10
13 11
14 12
15 13
16 14
17 15
18 16
19 17
20 18
21 19
22 20
23 21
24 23
25 24
26 25
27 26
28 27
29 28
30 29
31 30
32 31
33 32
34 33
35 34
36 35
37 36
38 37
39 38
40 39
41 40
42 41
43 43
44 44
45 45
46 46
47 47
48 48
49 49
50 50
51 51
52 52
53 53
54 54
55 55
56 56
57 57
58 58
59 59
60 60
61 61
62 62
63 63
64 64
65 65
66 66
67 67
68 68
69 69
70 70
71 71
72 72
73 73
74 74
75 75
76 76
77 77
78 78
79 79
80 80
81 81
82 82
83 83
84 84
85 85
86 86
87 87
88 88
89 89
90 90
91 91
92 92
93 93
94 94
95 95
96 96
97 97
98 98
99 99
100 100
101 101
102 102
103 103
104 104
105 105
106 106
107 107
108 108
109 109
110 110
111 111
112 112
113 113
114 114
115 115
116 116
117 117
118 118
119 119
120 120
121 121
122 122
123 123
124 124
125 125
126 126
127 127
128 128
129 129
130 130
131 131
132 132
133 133
134 134
135 135
136 136
137 137
138 138
139 139
140 140
141 141
142 142
143 143
144 144
145 145
146 146
147 147
148 148
149 149
150 150
151 151
152 153
153 154
154 155
155 156
156 157
157 158
158 159
159 160
160 161
161 162
162 163
163 164
164 165
165 166
166 167
167 168
168 169
169 170
170 171
171 172
172 173
173 174
174 175
175 176
176 177
177 179
178 180
179 181
180 182
181 183
182 184
183 185
184 186
185 187
186 188
187 189
188 190
189 191
190 192
191 193
192 194
193 195
194 196
195 197
196 198
197 199
198 200
199 201
200 202
201 203
202 204
203 205
204 206
205 207
206 208
207 209
208 210
209 211
210 212
211 213
212 214
213 215
214 216
215 217
216 218
217 219
218 220
219 221
220 222
221 223
222 224
223 225
224 226
225 227
226 228
227 229
228 230
229 231
230 232
231 233
232 234
233 235
234 236
235 237
236 238
237 239
238 240
239 241
240 242
241 243
242 244
243 245
244 246
245 247
246 248
247 249
248 250
249 251
250 252
251 253
252 254
253 255
254 256
255 257
256 258
257 259
258 260
259 261
260 262
261 263
262 264
263 265
264 266
265 267
266 268
267 269
268 270
269 271
270 272
271 273
272 274
273 275
274 276
275 277
276 278
277 279
278 280
279 281
280 282
281 283
Читать дальше