By Eric Conrad, Seth Misenar, Joshua Feldman

The CISSP certification is the main prestigious, globally-recognized, seller impartial examination for info safeguard execs. the latest variation of this acclaimed research consultant is aligned to hide the entire fabric integrated within the most modern model of the exam’s universal physique of information. the 10 domain names are lined thoroughly and as concisely as attainable with an eye fixed to acing the exam.

Each of the 10 domain names has its personal bankruptcy that incorporates in particular designed pedagogy to help the test-taker in passing the examination, together with: basically acknowledged examination goals; distinct terms/Definitions; examination Warnings; studying via instance; Hands-On workouts; bankruptcy finishing questions. additionally, exact positive aspects contain: perform checks; Tiered bankruptcy finishing questions that permit for a steady studying curve; and a self-test appendix

• offers the main whole and potent learn consultant to arrange you for passing the CISSP exam—contains purely what you want to go the try, with out fluff!

• Eric Conrad has ready thousands of execs for passing the CISSP examination via SANS, a well-liked and famous association for info safeguard professionals.

• Covers the entire new info within the universal physique of information up-to-date in January 2012, and in addition offers perform tests, tiered end-of-chapter questions for a gentle studying curve, and a whole self-test appendix.

Show description

Read Online or Download CISSP Study Guide (2nd Edition) PDF

Similar study aids books

Speed Math (Idiot's Guides)

The entire Idiot's advisor to hurry Math offers easy-to-understand equipment, guidance, and tips to do math in one's head, on paper, and on a calculator at a swifter cost and with extra accuracy for a person who's intimidated by way of math and for whom such calculations may differently require paper or calculator.

Cliffsnotes on Kingsolvers the Bean Trees

Ten years in the past, Barbara Kingsolver released a primary novel that's good on its technique to turning into a vintage paintings of yankee fiction. The Bean timber is a e-book readers have taken to their hearts. it truly is now a typical in university literature periods around the country and has been translated for a readership stretching from Japan to Romania.

Biology, 3rd Edition (Cliffs AP)

All the advisor to a better ranking at the AP Biology examination. integrated in ebook: A evaluation of the AP examination structure and scoring, confirmed ideas for answering multiple-choice questions, and tricks for tackling the essay questions. an inventory of 14 particular must-know ideas are lined. comprises pattern questions and solutions for every topic.

Additional info for CISSP Study Guide (2nd Edition)

Sample text

Object—A passive data file. Discretionary Access Control (DAC)—Gives subjects full control of objects they have been given access to, including sharing the objects with other subjects. Mandatory Access Control (MAC)—System-enforced access control based on subject’s clearances and object’s labels. Role-Based Access Control (RBAC)—Subjects are grouped into roles, and each defined role has access permissions based upon the role, not the individual. INTRODUCTION Access control is the basis for all security disciplines, not just IT security.

For example, if you had a weather website that required immediate data updates, but the information itself could have small errors in it (weather data is notoriously unreliable), the data integrity model would be different from a top secret database that had nuclear launch codes (it is very important that nuclear launch code data be both reliable and kept highly confidential). Discretionary Access Control (DAC) Discretionary Access Control (DAC) gives subjects full control of objects they have been given access to, including sharing the objects with other subjects.

Accountability—Ability to audit a system and demonstrate the actions of subjects. Decentralized access control Decentralized access control allows IT administration to occur closer to the mission and operations of the organization. In decentralized access control, an organization spans multiple locations, and the local sites support and maintain independent systems, access control databases, and data. Decentralized access control is also called distributed access control. This model provides more local power, as each site has control over its data.

Download PDF sample

Rated 4.84 of 5 – based on 8 votes