Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

CISSP Exam Cram

Specificaties
Paperback, blz. | Engels
Pearson Education | e druk, 2021
ISBN13: 9780137419555
Rubricering
Juridisch :
Pearson Education e druk, 2021 9780137419555
Onderdeel van serie Exam Cram
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Thoroughly updated to prepare candidates for the new exam, this book includes:  Chapters that map directly to the exam objectives Comprehensive foundational learning on all topics covered on the exam  An extensive collection of practice questions (including two full exams)  A state-of-the-art practice test engine that provides real-time practice and feedback  Notes, tips, sidebars, cautions, test-taking strategies, and time-saving tips that make studying as effective and time-efficient as possible  The Cram Sheet tear-out card including tips, acronyms, and memory joggers not available anywhere else--perfect for last-minute study 
Topics covered in this book include physical, network, applications, systems, and operations security; access control; cryptography; securing architecture and modeling; business continuity and disaster recovery; security forensics; security management practices; and much more.

Specificaties

ISBN13:9780137419555
Taal:Engels
Bindwijze:paperback
Serie:Exam Cram

Inhoudsopgave

<div> &nbsp; &nbsp;Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 </div> <div> <br> </div> <div> CHAPTER 1: The CISSP Certification Exam. . . . . . . . . . . . . . . . . . . . 19 </div> <div> <br> </div> <div> &nbsp; &nbsp;Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 </div> <div> <br> </div> <div> &nbsp; &nbsp;Assessing Exam Readiness.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 </div> <div> <br> </div> <div> &nbsp; &nbsp;Exam Topics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 </div> <div> <br> </div> <div> &nbsp; &nbsp;Taking the Exam. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 </div> <div> <br> </div> <div> &nbsp; &nbsp;Examples of CISSP Test Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . 24 </div> <div> <br> </div> <div> &nbsp; &nbsp;Answer to Multiple-Choice Question.. . . . . . . . . . . . . . . . . . . . . . . . 26 </div> <div> <br> </div> <div> &nbsp; &nbsp;Answer to Drag and Drop Question.. . . . . . . . . . . . . . . . . . . . . . . . . 26 </div> <div> <br> </div> <div> &nbsp; &nbsp;Answer to Hotspot Question.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 </div> <div> <br> </div> <div> &nbsp; &nbsp;Question-Handling Strategies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 </div> <div> <br> </div> <div> &nbsp; &nbsp;Mastering the Inner Game.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 </div> <div> <br> </div> <div> &nbsp; &nbsp;Need to Know More?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 </div> <div> <br> </div> <div> CHAPTER 2: Understanding Asset Security . . . . . . . . . . . . . . . . . . . . 29 </div> <div> <br> </div> <div> &nbsp; &nbsp;Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 </div> <div> <br> </div> <div> &nbsp; &nbsp;Basic Security Principles.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 </div> <div> <br> </div> <div> &nbsp; &nbsp;Data Management: Determining and Maintaining Ownership.. . . . . . . 32 </div> <div> <br> </div> <div> &nbsp; &nbsp;Data Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 </div> <div> <br> </div> <div> &nbsp; &nbsp;Data Security, Protection, Sharing, and Dissemination.. . . . . . . . . . . . . 42 </div> <div> <br> </div> <div> &nbsp; &nbsp;Classifying Information and Supporting Asset Classification.. . . . . . . . . 47 </div> <div> <br> </div> <div> &nbsp; &nbsp;Asset Management and Governance.. . . . . . . . . . . . . . . . . . . . . . . . . 51 </div> <div> <br> </div> <div> &nbsp; &nbsp;Determining Data Security Controls.. . . . . . . . . . . . . . . . . . . . . . . . . 55 </div> <div> <br> </div> <div> &nbsp; &nbsp;Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 </div> <div> <br> </div> <div> &nbsp; &nbsp;Answers to Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . 66 </div> <div> <br> </div> <div> &nbsp; &nbsp;Need to Know More?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 </div> <div> <br> </div> <div> CHAPTER 3: Security and Risk Management... . . . . . . . . . . . . . . . . . 69 </div> <div> <br> </div> <div> &nbsp; &nbsp;Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 </div> <div> <br> </div> <div> &nbsp; &nbsp;Security Governance.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 </div> <div> <br> </div> <div> &nbsp; &nbsp;U.S. Legal System and Laws. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 </div> <div> <br> </div> <div> &nbsp; &nbsp;International Legal Systems and Laws.. . . . . . . . . . . . . . . . . . . . . . . . 72 </div> <div> <br> </div> <div> &nbsp; &nbsp;Global Legal and Regulatory Issues. . . . . . . . . . . . . . . . . . . . . . . . . . 74 </div> <div> <br> </div> <div> &nbsp; &nbsp;Risk Management Concepts.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 </div> <div> <br> </div> <div> &nbsp; &nbsp;Selecting Countermeasures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 </div> <div> <br> </div> <div> &nbsp; &nbsp;Threat Modeling Concepts and Methodologies. . . . . . . . . . . . . . . . . . 107 </div> <div> <br> </div> <div> &nbsp; &nbsp;Managing Risk with the Supply Chain and Third Parties.. . . . . . . . . . . 110 </div> <div> <br> </div> <div> &nbsp; &nbsp;Identifying and Prioritizing Business Continuity </div> <div> <br> </div> <div> &nbsp; &nbsp;Requirements Based on Risk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 </div> <div> <br> </div> <div> &nbsp; &nbsp;Developing and Implementing Security Policy.. . . . . . . . . . . . . . . . . . 123 </div> <div> <br> </div> <div> &nbsp; &nbsp;Types of Controls.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 </div> <div> <br> </div> <div> &nbsp; &nbsp;Implementing Personnel Security.. . . . . . . . . . . . . . . . . . . . . . . . . . . 130 </div> <div> <br> </div> <div> &nbsp; &nbsp;Security Education, Training, and Awareness.. . . . . . . . . . . . . . . . . . . 134 </div> <div> <br> </div> <div> &nbsp; &nbsp;Professional Ethics Training and Awareness.. . . . . . . . . . . . . . . . . . . . 137 </div> <div> <br> </div> <div> &nbsp; &nbsp;Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 </div> <div> <br> </div> <div> &nbsp; &nbsp;Answers to Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . 148 </div> <div> <br> </div> <div> &nbsp; &nbsp;Need to Know More?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 </div> <div> <br> </div> <div> CHAPTER 4: Security Architecture and Engineering.. . . . . . . . . . . . . . 151 </div> <div> <br> </div> <div> &nbsp; &nbsp;Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 </div> <div> <br> </div> <div> &nbsp; &nbsp;Secure Design Guidelines and Governance Principles.. . . . . . . . . . . . . 152 </div> <div> <br> </div> <div> &nbsp; &nbsp;Fundamental Concepts of Security Models. . . . . . . . . . . . . . . . . . . . . 158 </div> <div> <br> </div> <div> &nbsp; &nbsp;Security Architecture.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 </div> <div> <br> </div> <div> &nbsp; &nbsp;Common Formal Security Models. . . . . . . . . . . . . . . . . . . . . . . . . . . 179 </div> <div> <br> </div> <div> &nbsp; &nbsp;Product Security Evaluation Models.. . . . . . . . . . . . . . . . . . . . . . . . . 189 </div> <div> <br> </div> <div> &nbsp; &nbsp;System Validation.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 </div> <div> <br> </div> <div> &nbsp; &nbsp;Vulnerabilities of Security Architectures. . . . . . . . . . . . . . . . . . . . . . . 195 </div> <div> <br> </div> <div> &nbsp; &nbsp;Cryptography.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 </div> <div> <br> </div> <div> &nbsp; &nbsp;Algorithms.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 </div> <div> <br> </div> <div> &nbsp; &nbsp;Cipher Types and Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 </div> <div> <br> </div> <div> &nbsp; &nbsp;Symmetric Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 </div> <div> <br> </div> <div> &nbsp; &nbsp;Asymmetric Encryption.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 </div> <div> <br> </div> <div> &nbsp; &nbsp;Hybrid Encryption.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 </div> <div> <br> </div> <div> &nbsp; &nbsp;Public Key Infrastructure and Key Management.. . . . . . . . . . . . . . . . . 225 </div> <div> <br> </div> <div> &nbsp; &nbsp;Integrity and Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 </div> <div> <br> </div> <div> &nbsp; &nbsp;Cryptographic Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 </div> <div> <br> </div> <div> &nbsp; &nbsp;Site and Facility Security Controls.. . . . . . . . . . . . . . . . . . . . . . . . . . 240 </div> <div> <br> </div> <div> &nbsp; &nbsp;Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 </div> <div> <br> </div> <div> &nbsp; &nbsp;Answers to Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . 246 </div> <div> <br> </div> <div> &nbsp; &nbsp;Need to Know More?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 </div> <div> <br> </div> <div> CHAPTER 5: Communications and Network Security . . . . . . . . . . . . . 249 </div> <div> <br> </div> <div> &nbsp; &nbsp;Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 </div> <div> <br> </div> <div> &nbsp; &nbsp;Secure Network Design.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 </div> <div> <br> </div> <div> &nbsp; &nbsp;Network Models and Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 </div> <div> <br> </div> <div> &nbsp; &nbsp;TCP/IP.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 </div> <div> <br> </div> <div> &nbsp; &nbsp;LANs and Their Components.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 </div> <div> <br> </div> <div> &nbsp; &nbsp;Communication Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 </div> <div> <br> </div> <div> &nbsp; &nbsp;Network Equipment.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 </div> <div> <br> </div> <div> &nbsp; &nbsp;Routing.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 </div> <div> <br> </div> <div> &nbsp; &nbsp;WANs and Their Components.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 </div> <div> <br> </div> <div> &nbsp; &nbsp;Cloud Computing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 </div> <div> <br> </div> <div> &nbsp; &nbsp;Software-Defined WAN (SD-WAN).. . . . . . . . . . . . . . . . . . . . . . . . . 296 </div> <div> <br> </div> <div> &nbsp; &nbsp;Securing Email Communications.. . . . . . . . . . . . . . . . . . . . . . . . . . . 296 </div> <div> <br> </div> <div> &nbsp; &nbsp;Securing Voice and Wireless Communications.. . . . . . . . . . . . . . . . . . 298 </div> <div> <br> </div> <div> &nbsp; &nbsp;Securing TCP/IP with Cryptographic Solutions.. . . . . . . . . . . . . . . . . 316 </div> <div> <br> </div> <div> &nbsp; &nbsp;Network Access Control Devices.. . . . . . . . . . . . . . . . . . . . . . . . . . . 321 </div> <div> <br> </div> <div> &nbsp; &nbsp;Remote Access.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 </div> <div> <br> </div> <div> &nbsp; &nbsp;Message Privacy and Multimedia Collaboration.. . . . . . . . . . . . . . . . . 331 </div> <div> <br> </div> <div> &nbsp; &nbsp;Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 </div> <div> <br> </div> <div> &nbsp; &nbsp;Answers to Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . 337 </div> <div> <br> </div> <div> &nbsp; &nbsp;Need to Know More?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 </div> <div> <br> </div> <div> CHAPTER 6: Identity and Access Management. . . . . . . . . . . . . . . . . . 341 </div> <div> <br> </div> <div> &nbsp; &nbsp;Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 </div> <div> <br> </div> <div> &nbsp; &nbsp;Perimeter Physical Control Systems.. . . . . . . . . . . . . . . . . . . . . . . . . 344 </div> <div> <br> </div> <div> &nbsp; &nbsp;Employee Access Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 </div> <div> <br> </div> <div> &nbsp; &nbsp;Identification, Authentication, and Authorization. . . . . . . . . . . . . . . . . 358 </div> <div> <br> </div> <div> &nbsp; &nbsp;Single Sign-On (SSO).. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 </div> <div> <br> </div> <div> &nbsp; &nbsp;Authorization and Access Control Techniques. . . . . . . . . . . . . . . . . . . 382 </div> <div> <br> </div> <div> &nbsp; &nbsp;Centralized and Decentralized Access Control Models. . . . . . . . . . . . . 390 </div> <div> <br> </div> <div> &nbsp; &nbsp;Audits and Monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 </div> <div> <br> </div> <div> &nbsp; &nbsp;Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404 </div> <div> <br> </div> <div> &nbsp; &nbsp;Answers to Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . 408 </div> <div> <br> </div> <div> &nbsp; &nbsp;Suggesting Reading and Resources.. . . . . . . . . . . . . . . . . . . . . . . . . . 410 </div> <div> <br> </div> <div> CHAPTER 7: Security Assessment and Testing. . . . . . . . . . . . . . . . . . . 411 </div> <div> <br> </div> <div> &nbsp; &nbsp;Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412 </div> <div> <br> </div> <div> &nbsp; &nbsp;Security Assessments and Penetration Test Strategies. . . . . . . . . . . . . . 412 </div> <div> <br> </div> <div> &nbsp; &nbsp;Test Techniques and Methods.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424 </div> <div> <br> </div> <div> &nbsp; &nbsp;Security Threats and Vulnerabilities.. . . . . . . . . . . . . . . . . . . . . . . . . 427 </div> <div> <br> </div> <div> &nbsp; &nbsp;Network Security Threats and Attack Techniques.. . . . . . . . . . . . . . . . 431 </div> <div> <br> </div> <div> &nbsp; &nbsp;Access Control Threats and Attack Techniques.. . . . . . . . . . . . . . . . . . 438 </div> <div> <br> </div> <div> &nbsp; &nbsp;Social-Based Threats and Attack Techniques. . . . . . . . . . . . . . . . . . . . 443 </div> <div> <br> </div> <div> &nbsp; &nbsp;Malicious Software Threats and Attack Techniques.. . . . . . . . . . . . . . . 444 </div> <div> <br> </div> <div> &nbsp; &nbsp;Investigating Computer Crime.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452 </div> <div> <br> </div> <div> &nbsp; &nbsp;Disaster Recovery and Business Continuity.. . . . . . . . . . . . . . . . . . . . 458 </div> <div> <br> </div> <div> &nbsp; &nbsp;Investigations.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459 </div> <div> <br> </div> <div> &nbsp; &nbsp;Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 </div> <div> <br> </div> <div> &nbsp; &nbsp;Answers to Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . 464 </div> <div> <br> </div> <div> &nbsp; &nbsp;Need to Know More?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 </div> <div> <br> </div> <div> CHAPTER 8: Security Operations... . . . . . . . . . . . . . . . . . . . . . . . . . . 467 </div> <div> <br> </div> <div> &nbsp; &nbsp;Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468 </div> <div> <br> </div> <div> &nbsp; &nbsp;Foundational Security Operations Concepts.. . . . . . . . . . . . . . . . . . . . 468 </div> <div> <br> </div> <div> &nbsp; &nbsp;Resource Protection.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472 </div> <div> <br> </div> <div> &nbsp; &nbsp;Telecommunication Controls.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477 </div> <div> <br> </div> <div> &nbsp; &nbsp;System Resilience, Fault Tolerance, and Recovery Controls.. . . . . . . . . 486 </div> <div> <br> </div> <div> &nbsp; &nbsp;Monitoring and Auditing Controls.. . . . . . . . . . . . . . . . . . . . . . . . . . 487 </div> <div> <br> </div> <div> &nbsp; &nbsp;Perimeter Security Controls and Risks. . . . . . . . . . . . . . . . . . . . . . . . 493 </div> <div> <br> </div> <div> &nbsp; &nbsp;Facility Concerns and Requirements.. . . . . . . . . . . . . . . . . . . . . . . . . 495 </div> <div> <br> </div> <div> &nbsp; &nbsp;Environmental Controls.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502 </div> <div> <br> </div> <div> &nbsp; &nbsp;Electrical Power.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503 </div> <div> <br> </div> <div> &nbsp; &nbsp;Equipment Lifecycle.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505 </div> <div> <br> </div> <div> &nbsp; &nbsp;Fire Prevention, Detection, and Suppression. . . . . . . . . . . . . . . . . . . . 505 </div> <div> <br> </div> <div> &nbsp; &nbsp;Alarm Systems.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509 </div> <div> <br> </div> <div> &nbsp; &nbsp;Intrusion Detection and Prevention Systems. . . . . . . . . . . . . . . . . . . . 512 </div> <div> <br> </div> <div> &nbsp; &nbsp;Investigations and Incidents.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513 </div> <div> <br> </div> <div> &nbsp; &nbsp;Digital Forensics, Tools, Tactics, and Procedures.. . . . . . . . . . . . . . . . . 514 </div> <div> <br> </div> <div> &nbsp; &nbsp;The Disaster Recovery Lifecycle. . . . . . . . . . . . . . . . . . . . . . . . . . . . 521 </div> <div> <br> </div> <div> &nbsp; &nbsp;Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549 </div> <div> <br> </div> <div> &nbsp; &nbsp;Answers to Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . 555 </div> <div> <br> </div> <div> &nbsp; &nbsp;Need to Know More?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558 </div> <div> <br> </div> <div> CHAPTER 9: Software Development Security... . . . . . . . . . . . . . . . . . . 559 </div> <div> <br> </div> <div> &nbsp; &nbsp;Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560 </div> <div> <br> </div> <div> &nbsp; &nbsp;Integrating Security into the Development Lifecycle.. . . . . . . . . . . . . . 560 </div> <div> <br> </div> <div> &nbsp; &nbsp;Development Methodologies.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573 </div> <div> <br> </div> <div> &nbsp; &nbsp;Change Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580 </div> <div> <br> </div> <div> &nbsp; &nbsp;Database Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582 </div> <div> <br> </div> <div> &nbsp; &nbsp;Programming Languages, Secure Coding Guidelines, and Standards.. . . 588 </div> <div> <br> </div> <div> &nbsp; &nbsp;Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599 </div> <div> <br> </div> <div> &nbsp; &nbsp;Answers to Exam Prep Questions.. . . . . . . . . . . . . . . . . . . . . . . . . . . 603 </div> <div> <br> </div> <div> &nbsp; &nbsp;Need to Know More?.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605 </div> <div> <br> </div> <div> Practice Exam I.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607 </div> <div> <br> </div> <div> Practice Exam II. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 621 </div> <div> <br> </div> <div> Answers to Practice Exam I.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635 </div> <div> <br> </div> <div> Answers to Practice Exam II. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651 </div> <div> <br> </div> <div> Glossary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667 </div> <div> <br> </div> <div> <br> </div> <div> <br> </div> <div> 9780137419555, TOC, 6/7/2021 </div> <div> <br> </div> <div> <br> </div>

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        CISSP Exam Cram