CISSP For Dummies
Chapter 3: Putting Your Certification to Good Use
- Why volunteer?
Chapter 4: Access Control
- “Polly wanna hacker?”
Chapter 5: Telecommunications and Network Security
- Instant Answer Analog and digital signaling
- Asynchronous and synchronous communications
Chapter 6: Information Security and Risk Management
- Cross-Reference Professional ethics
Chapter 7: Application Security
- Technical Stuff Objective trivia
- The Open Web Applications Security Project
- Technical Stuff The Morris Worm
- Bot armies: The power of one
- Professional perps and organized crime
Chapter 8: Cryptography
- A brief history of cryptography
- Instant Answer The science of crypto
- The XORcist
- Secure Electronic Transaction (SET)
Chapter 10: Operations Security
- Accumulation of privileges
- Remember Security is now the law
- Tip ISO 27001: The code of practice for data security
- Audit or audit trail?
- Audit trails - the justification for time synchronization
- Packet sniffing isn’t all bad
- Security event resolution
Chapter 11: Business Continuity and Disaster Recovery Planning
- Disaster Recovery Planning and September 11
- Tip BCP and DRP: A simple illustration
- Warning Who says External Affairs is nonessential?
- Getting amazing things done
- Remember Why hire an expert?
- Not only response, but also prevention
Chapter 12: Legal, Regulations, Compliance, and Investigations
- Technical Stuff Lawyer-speak