CISSP For Dummies
Chapter 3: Putting Your Certification to Good Use
- Table 3-1: Post-CISSP Activities
Chapter 4: Access Control
- Table 4-1: Generally Accepted Standards for Biometric Systems
- Table 4-2: General Characteristics of Finger Scan and Hand Geometry Systems
- Table 4-3: General Characteristics of Retina and Iris Pattern Systems
- Table 4-4: General Characteristics of Voice Recognition and
Chapter 5: Telecommunications and Network Security
- Table 5-1: Twisted Pair Cable Classes
- Table 5-2: Cable Types and Characteristics
- Table 5-3: The IEEE 802 Standards
- Table 5-4: Wireless LAN Protocols
- Table 5-5: Standard Leased Lines
- Table 5-6: ISDN Service Levels
- Table 5-7: xDSL Examples
- Table 5-8: Circuit Switching versus Packet Switching
- Table 5-9: IP Address Classes
- Table 5-10: Connection-oriented and Connectionless Protocols
Chapter 9: Security Architecture and Design
- Table 9-1: Access Matrix Example
- Table 9-2: TCSEC Classes
- Table 9-3: ITSEC Functionality (F) Classes and Evaluation (E) Levels
- Table 9-4: The Common Criteria
Chapter 11: Business Continuity and Disaster Recovery Planning
- Table 10-1: Data Processing Continuity Planning Site Comparison
Chapter 13: Physical (Environmental) Security
- Table 13-1: Fire Classes and Suppression/Extinguishing Methods
- Table 13-2: Electrical Anomalies
- Table 13-3: General Fencing Height Requirements
Категории