Foreword |
|
xx | |
Acknowledgments |
|
xxiii | |
|
Chapter 1 Becoming a CISSP |
|
|
1 | (20) |
|
|
1 | (1) |
|
|
2 | (4) |
|
|
6 | (1) |
|
How Do You Sign Up for the Exam? |
|
|
7 | (1) |
|
What Does This Book Cover? |
|
|
7 | (1) |
|
Tips for Taking the CISSP Exam |
|
|
8 | (1) |
|
|
9 | (12) |
|
|
10 | (9) |
|
|
19 | (2) |
|
Chapter 2 Information Security Governance and Risk Management |
|
|
21 | (136) |
|
Fundamental Principles of Security |
|
|
22 | (4) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (2) |
|
|
26 | (2) |
|
|
28 | (6) |
|
|
34 | (35) |
|
|
36 | (5) |
|
Enterprise Architecture Development |
|
|
41 | (14) |
|
Security Controls Development |
|
|
55 | (4) |
|
|
59 | (1) |
|
Process Management Development |
|
|
60 | (8) |
|
Functionality vs. Security |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
70 | (4) |
|
Who Really Understands Risk Management? |
|
|
71 | (1) |
|
Information Risk Management Policy |
|
|
72 | (1) |
|
|
73 | (1) |
|
Risk Assessment and Analysis |
|
|
74 | (27) |
|
|
75 | (1) |
|
The Value of Information and Assets |
|
|
76 | (1) |
|
Costs That Make Up the Value |
|
|
76 | (1) |
|
Identifying Vulnerabilities and Threats |
|
|
77 | (1) |
|
Methodologies for Risk Assessment |
|
|
78 | (7) |
|
|
85 | (4) |
|
Qualitative Risk Analysis |
|
|
89 | (3) |
|
|
92 | (4) |
|
|
96 | (1) |
|
Total Risk vs. Residual Risk |
|
|
96 | (1) |
|
|
97 | (3) |
|
|
100 | (1) |
|
Policies, Standards, Baselines, Guidelines, and Procedures |
|
|
101 | (8) |
|
|
102 | (3) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
Information Classification |
|
|
109 | (5) |
|
|
110 | (3) |
|
|
113 | (1) |
|
|
114 | (6) |
|
|
115 | (1) |
|
|
116 | (2) |
|
Chief Information Officer |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
Security Steering Committee |
|
|
120 | (12) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
129 | (1) |
|
Security-Awareness Training |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (5) |
|
|
132 | (5) |
|
|
137 | (1) |
|
|
138 | (19) |
|
|
141 | (9) |
|
|
150 | (7) |
|
|
157 | (140) |
|
|
157 | (1) |
|
|
158 | (2) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
Identification, Authentication, Authorization, and Accountability |
|
|
160 | (59) |
|
Identification and Authentication |
|
|
162 | (12) |
|
|
174 | (29) |
|
|
203 | (16) |
|
|
219 | (8) |
|
Discretionary Access Control |
|
|
220 | (1) |
|
|
221 | (3) |
|
Role-Based Access Control |
|
|
224 | (3) |
|
Access Control Techniques and Technologies |
|
|
227 | (5) |
|
Rule-Based Access Control |
|
|
227 | (1) |
|
Constrained User Interfaces |
|
|
228 | (1) |
|
|
229 | (2) |
|
Content-Dependent Access Control |
|
|
231 | (1) |
|
Context-Dependent Access Control |
|
|
231 | (1) |
|
Access Control Administration |
|
|
232 | (9) |
|
Centralized Access Control Administration |
|
|
233 | (7) |
|
Decentralized Access Control Administration |
|
|
240 | (1) |
|
|
241 | (7) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (2) |
|
|
245 | (3) |
|
|
248 | (4) |
|
Review of Audit Information |
|
|
250 | (1) |
|
Protecting Audit Data and Log Information |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (3) |
|
Unauthorized Disclosure of Information |
|
|
253 | (2) |
|
Access Control Monitoring |
|
|
255 | (13) |
|
|
255 | (10) |
|
Intrusion Prevention Systems |
|
|
265 | (3) |
|
Threats to Access Control |
|
|
268 | (9) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
271 | (2) |
|
|
273 | (4) |
|
|
277 | (1) |
|
|
277 | (20) |
|
|
282 | (9) |
|
|
291 | (6) |
|
Chapter 4 Security Architecture and Design |
|
|
297 | (130) |
|
|
298 | (2) |
|
|
300 | (3) |
|
|
303 | (44) |
|
The Central Processing Unit |
|
|
304 | (5) |
|
|
309 | (3) |
|
Operating System Components |
|
|
312 | (13) |
|
|
325 | (12) |
|
|
337 | (3) |
|
Input/Output Device Management |
|
|
340 | (2) |
|
|
342 | (5) |
|
Operating System Architectures |
|
|
347 | (10) |
|
|
355 | (2) |
|
System Security Architecture |
|
|
357 | (8) |
|
|
357 | (2) |
|
Security Architecture Requirements |
|
|
359 | (6) |
|
|
365 | (21) |
|
|
367 | (2) |
|
|
369 | (3) |
|
|
372 | (2) |
|
|
374 | (3) |
|
|
377 | (3) |
|
|
380 | (1) |
|
|
381 | (2) |
|
|
383 | (1) |
|
|
384 | (1) |
|
Harrison-Ruzzo-Ullman Model |
|
|
385 | (1) |
|
Security Modes of Operation |
|
|
386 | (5) |
|
|
387 | (1) |
|
System High-Security Mode |
|
|
387 | (1) |
|
Compartmented Security Mode |
|
|
387 | (1) |
|
|
388 | (2) |
|
|
390 | (1) |
|
Systems Evaluation Methods |
|
|
391 | (6) |
|
Why Put a Product Through Evaluation? |
|
|
391 | (1) |
|
|
392 | (5) |
|
The Orange Book and the Rainbow Series |
|
|
397 | (2) |
|
|
398 | (1) |
|
Information Technology Security Evaluation Criteria |
|
|
399 | (3) |
|
|
402 | (4) |
|
Certification vs. Accreditation |
|
|
406 | (2) |
|
|
406 | (1) |
|
|
406 | (2) |
|
|
408 | (1) |
|
|
408 | (1) |
|
|
408 | (1) |
|
|
409 | (3) |
|
|
409 | (1) |
|
Time-of-Check/Time-of-Use Attacks |
|
|
410 | (2) |
|
|
412 | (1) |
|
|
413 | (14) |
|
|
416 | (7) |
|
|
423 | (4) |
|
Chapter 5 Physical and Environmental Security |
|
|
427 | (88) |
|
Introduction to Physical Security |
|
|
427 | (3) |
|
|
430 | (27) |
|
Crime Prevention Through Environmental Design |
|
|
435 | (7) |
|
Designing a Physical Security Program |
|
|
442 | (15) |
|
|
457 | (1) |
|
|
458 | (17) |
|
|
459 | (6) |
|
|
465 | (2) |
|
|
467 | (1) |
|
Fire Prevention, Detection, and Suppression |
|
|
467 | (8) |
|
|
475 | (24) |
|
|
476 | (7) |
|
Personnel Access Controls |
|
|
483 | (1) |
|
External Boundary Protection Mechanisms |
|
|
484 | (9) |
|
Intrusion Detection Systems |
|
|
493 | (4) |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
499 | (16) |
|
|
502 | (7) |
|
|
509 | (6) |
|
Chapter 6 Telecommunications and Network Security |
|
|
515 | (244) |
|
|
517 | (1) |
|
Open Systems Interconnection Reference Model |
|
|
517 | (17) |
|
|
518 | (3) |
|
|
521 | (1) |
|
|
522 | (1) |
|
|
523 | (2) |
|
|
525 | (2) |
|
|
527 | (1) |
|
|
528 | (2) |
|
|
530 | (1) |
|
Functions and Protocols in the OSI Model |
|
|
530 | (2) |
|
Tying the Layers Together |
|
|
532 | (2) |
|
|
534 | (16) |
|
|
535 | (6) |
|
|
541 | (3) |
|
|
544 | (3) |
|
Layer 2 Security Standards |
|
|
547 | (3) |
|
|
550 | (6) |
|
|
550 | (2) |
|
Asynchronous and Synchronous |
|
|
552 | (2) |
|
|
554 | (2) |
|
|
556 | (6) |
|
|
557 | (1) |
|
|
557 | (1) |
|
|
558 | (2) |
|
|
560 | (2) |
|
|
562 | (50) |
|
|
563 | (2) |
|
Media Access Technologies |
|
|
565 | (15) |
|
Network Protocols and Services |
|
|
580 | (10) |
|
|
590 | (9) |
|
|
599 | (5) |
|
Network Address Translation |
|
|
604 | (4) |
|
|
608 | (4) |
|
|
612 | (48) |
|
|
612 | (1) |
|
|
613 | (2) |
|
|
615 | (2) |
|
|
617 | (4) |
|
|
621 | (3) |
|
|
624 | (4) |
|
|
628 | (25) |
|
|
653 | (2) |
|
|
655 | (1) |
|
Unified Threat Management |
|
|
656 | (1) |
|
|
657 | (3) |
|
|
660 | (3) |
|
Metropolitan Area Networks |
|
|
663 | (2) |
|
|
665 | (30) |
|
Telecommunications Evolution |
|
|
666 | (3) |
|
|
669 | (4) |
|
|
673 | (22) |
|
|
695 | (17) |
|
|
695 | (2) |
|
|
697 | (1) |
|
|
698 | (2) |
|
|
700 | (2) |
|
|
702 | (7) |
|
|
709 | (3) |
|
|
712 | (27) |
|
|
712 | (4) |
|
|
716 | (7) |
|
|
723 | (5) |
|
|
728 | (1) |
|
|
729 | (1) |
|
Mobile Wireless Communication |
|
|
730 | (6) |
|
|
736 | (3) |
|
|
739 | (1) |
|
|
740 | (19) |
|
|
744 | (9) |
|
|
753 | (6) |
|
|
759 | (126) |
|
The History of Cryptography |
|
|
760 | (5) |
|
Cryptography Definitions and Concepts |
|
|
765 | (12) |
|
|
767 | (1) |
|
The Strength of the Cryptosystem |
|
|
768 | (1) |
|
Services of Cryptosystems |
|
|
769 | (2) |
|
|
771 | (2) |
|
Running and Concealment Ciphers |
|
|
773 | (1) |
|
|
774 | (3) |
|
|
777 | (4) |
|
|
778 | (1) |
|
|
778 | (3) |
|
|
781 | (19) |
|
Symmetric vs. Asymmetric Algorithms |
|
|
782 | (1) |
|
|
782 | (5) |
|
|
787 | (5) |
|
Hybrid Encryption Methods |
|
|
792 | (8) |
|
Types of Symmetric Systems |
|
|
800 | (12) |
|
|
800 | (8) |
|
|
808 | (1) |
|
The Advanced Encryption Standard |
|
|
809 | (1) |
|
International Data Encryption Algorithm |
|
|
809 | (1) |
|
|
810 | (1) |
|
|
810 | (1) |
|
|
810 | (1) |
|
|
810 | (2) |
|
Types of Asymmetric Systems |
|
|
812 | (8) |
|
The Diffie-Hellman Algorithm |
|
|
812 | (3) |
|
|
815 | (3) |
|
|
818 | (1) |
|
Elliptic Curve Cryptosystems |
|
|
818 | (1) |
|
|
819 | (1) |
|
|
819 | (1) |
|
|
820 | (13) |
|
|
820 | (6) |
|
Various Hashing Algorithms |
|
|
826 | (1) |
|
|
826 | (1) |
|
|
826 | (1) |
|
|
827 | (1) |
|
Attacks Against One-Way Hash Functions |
|
|
827 | (2) |
|
|
829 | (3) |
|
Digital Signature Standard |
|
|
832 | (1) |
|
Public Key Infrastructure |
|
|
833 | (7) |
|
|
834 | (3) |
|
|
837 | (1) |
|
The Registration Authority |
|
|
837 | (1) |
|
|
838 | (2) |
|
|
840 | (3) |
|
Key Management Principles |
|
|
841 | (1) |
|
Rules for Keys and Key Management |
|
|
842 | (1) |
|
|
843 | (2) |
|
|
843 | (2) |
|
Link Encryption vs. End-to-End Encryption |
|
|
845 | (4) |
|
|
849 | (4) |
|
Multipurpose Internet Mail Extension |
|
|
849 | (1) |
|
|
850 | (3) |
|
|
853 | (12) |
|
|
854 | (11) |
|
|
865 | (5) |
|
|
865 | (1) |
|
|
865 | (1) |
|
|
866 | (1) |
|
Chosen-Ciphertext Attacks |
|
|
866 | (1) |
|
Differential Cryptanalysis |
|
|
866 | (1) |
|
|
867 | (1) |
|
|
867 | (1) |
|
|
868 | (1) |
|
|
868 | (1) |
|
|
868 | (1) |
|
|
869 | (1) |
|
Social Engineering Attacks |
|
|
869 | (1) |
|
Meet-in-the-Middle Attacks |
|
|
869 | (1) |
|
|
870 | (1) |
|
|
871 | (14) |
|
|
874 | (6) |
|
|
880 | (5) |
|
Chapter 8 Business Continuity and Disaster Recovery Planning |
|
|
885 | (94) |
|
Business Continuity and Disaster Recovery |
|
|
887 | (10) |
|
Standards and Best Practices |
|
|
890 | (3) |
|
Making BCM Part of the Enterprise Security Program |
|
|
893 | (4) |
|
|
897 | (16) |
|
|
899 | (2) |
|
|
901 | (1) |
|
|
901 | (3) |
|
Business Continuity Planning Requirements |
|
|
904 | (1) |
|
Business Impact Analysis (BIA) |
|
|
905 | (7) |
|
|
912 | (1) |
|
|
913 | (1) |
|
|
914 | (30) |
|
Business Process Recovery |
|
|
918 | (1) |
|
|
919 | (7) |
|
Supply and Technology Recovery |
|
|
926 | (4) |
|
Choosing a Software Backup Facility |
|
|
930 | (3) |
|
|
933 | (1) |
|
|
934 | (4) |
|
Electronic Backup Solutions |
|
|
938 | (3) |
|
|
941 | (3) |
|
|
944 | (1) |
|
|
945 | (8) |
|
Developing Goals for the Plans |
|
|
949 | (2) |
|
|
951 | (2) |
|
Testing and Revising the Plan |
|
|
953 | (8) |
|
|
955 | (1) |
|
Structured Walk-Through Test |
|
|
955 | (1) |
|
|
955 | (1) |
|
|
955 | (1) |
|
|
956 | (1) |
|
|
956 | (1) |
|
|
956 | (2) |
|
|
958 | (3) |
|
|
961 | (1) |
|
|
961 | (18) |
|
|
964 | (8) |
|
|
972 | (7) |
|
Chapter 9 Legal, Regulations, Investigations, and Compliance |
|
|
979 | (102) |
|
The Many Facets of Cyberlaw |
|
|
980 | (1) |
|
The Crux of Computer Crime Laws |
|
|
981 | (2) |
|
Complexities in Cybercrime |
|
|
983 | (15) |
|
|
985 | (1) |
|
|
986 | (4) |
|
|
990 | (4) |
|
|
994 | (4) |
|
Intellectual Property Laws |
|
|
998 | (8) |
|
|
999 | (1) |
|
|
1000 | (1) |
|
|
1001 | (1) |
|
|
1001 | (2) |
|
Internal Protection of Intellectual Property |
|
|
1003 | (1) |
|
|
1004 | (2) |
|
|
1006 | (16) |
|
The Increasing Need for Privacy Laws |
|
|
1008 | (1) |
|
Laws, Directives, and Regulations |
|
|
1009 | (13) |
|
Liability and Its Ramifications |
|
|
1022 | (8) |
|
|
1027 | (1) |
|
|
1027 | (1) |
|
|
1028 | (1) |
|
|
1029 | (1) |
|
Procurement and Vendor Processes |
|
|
1029 | (1) |
|
|
1030 | (2) |
|
|
1032 | (29) |
|
|
1033 | (4) |
|
Incident Response Procedures |
|
|
1037 | (5) |
|
Computer Forensics and Proper Collection of Evidence |
|
|
1042 | (1) |
|
International Organization on Computer Evidence |
|
|
1043 | (1) |
|
Motive, Opportunity, and Means |
|
|
1044 | (1) |
|
Computer Criminal Behavior |
|
|
1044 | (1) |
|
|
1045 | (1) |
|
The Forensics Investigation Process |
|
|
1046 | (7) |
|
What Is Admissible in Court? |
|
|
1053 | (4) |
|
Surveillance, Search, and Seizure |
|
|
1057 | (1) |
|
Interviewing and Interrogating |
|
|
1058 | (1) |
|
A Few Different Attack Types |
|
|
1058 | (3) |
|
|
1061 | (1) |
|
|
1061 | (4) |
|
The Computer Ethics Institute |
|
|
1062 | (1) |
|
The Internet Architecture Board |
|
|
1063 | (1) |
|
Corporate Ethics Programs |
|
|
1064 | (1) |
|
|
1065 | (1) |
|
|
1065 | (16) |
|
|
1069 | (7) |
|
|
1076 | (5) |
|
Chapter 10 Software Development Security |
|
|
1081 | (152) |
|
|
1081 | (1) |
|
Where Do We Place Security? |
|
|
1082 | (5) |
|
Different Environments Demand Different Security |
|
|
1083 | (1) |
|
Environment versus Application |
|
|
1084 | (1) |
|
Functionality versus Security |
|
|
1085 | (1) |
|
Implementation and Default Issues |
|
|
1086 | (1) |
|
System Development Life Cycle |
|
|
1087 | (8) |
|
|
1089 | (2) |
|
|
1091 | (1) |
|
|
1092 | (1) |
|
|
1092 | (1) |
|
|
1093 | (2) |
|
Software Development Life Cycle |
|
|
1095 | (13) |
|
|
1096 | (1) |
|
Requirements Gathering Phase |
|
|
1096 | (2) |
|
|
1098 | (4) |
|
|
1102 | (2) |
|
|
1104 | (2) |
|
Release/Maintenance Phase |
|
|
1106 | (2) |
|
Secure Software Development Best Practices |
|
|
1108 | (3) |
|
Software Development Models |
|
|
1111 | (9) |
|
|
1111 | (1) |
|
|
1112 | (1) |
|
|
1112 | (1) |
|
|
1113 | (1) |
|
|
1114 | (1) |
|
|
1115 | (1) |
|
Rapid Application Development |
|
|
1116 | (2) |
|
|
1118 | (2) |
|
Capability Maturity Model Integration |
|
|
1120 | (2) |
|
|
1122 | (3) |
|
Software Configuration Management |
|
|
1124 | (1) |
|
Programming Languages and Concepts |
|
|
1125 | (17) |
|
Assemblers, Compilers, Interpreters |
|
|
1128 | (2) |
|
|
1130 | (12) |
|
|
1142 | (11) |
|
Distributed Computing Environment |
|
|
1142 | (1) |
|
|
1143 | (3) |
|
|
1146 | (2) |
|
Java Platform, Enterprise Edition |
|
|
1148 | (1) |
|
Service-Oriented Architecture |
|
|
1148 | (5) |
|
|
1153 | (4) |
|
|
1154 | (2) |
|
|
1156 | (1) |
|
|
1157 | (11) |
|
Specific Threats for Web Environments |
|
|
1158 | (9) |
|
Web Application Security Principles |
|
|
1167 | (1) |
|
|
1168 | (24) |
|
Database Management Software |
|
|
1170 | (1) |
|
|
1170 | (6) |
|
Database Programming Interfaces |
|
|
1176 | (1) |
|
Relational Database Components |
|
|
1177 | (3) |
|
|
1180 | (3) |
|
|
1183 | (5) |
|
Data Warehousing and Data Mining |
|
|
1188 | (4) |
|
Expert Systems/Knowledge-Based Systems |
|
|
1192 | (3) |
|
Artificial Neural Networks |
|
|
1195 | (2) |
|
Malicious Software (Malware) |
|
|
1197 | (17) |
|
|
1199 | (3) |
|
|
1202 | (1) |
|
|
1202 | (2) |
|
|
1204 | (1) |
|
|
1204 | (2) |
|
|
1206 | (1) |
|
|
1206 | (1) |
|
|
1207 | (3) |
|
|
1210 | (2) |
|
|
1212 | (2) |
|
|
1214 | (1) |
|
|
1215 | (18) |
|
|
1220 | (7) |
|
|
1227 | (6) |
|
Chapter 11 Security Operations |
|
|
1233 | (86) |
|
The Role of the Operations Department |
|
|
1234 | (1) |
|
Administrative Management |
|
|
1235 | (5) |
|
Security and Network Personnel |
|
|
1237 | (2) |
|
|
1239 | (1) |
|
|
1239 | (1) |
|
|
1240 | (1) |
|
Operational Responsibilities |
|
|
1240 | (11) |
|
Unusual or Unexplained Occurrences |
|
|
1241 | (1) |
|
Deviations from Standards |
|
|
1241 | (1) |
|
Unscheduled Initial Program Loads (aka Rebooting) |
|
|
1242 | (1) |
|
Asset Identification and Management |
|
|
1242 | (1) |
|
|
1243 | (1) |
|
|
1244 | (2) |
|
Input and Output Controls |
|
|
1246 | (2) |
|
|
1248 | (2) |
|
|
1250 | (1) |
|
|
1251 | (3) |
|
|
1252 | (1) |
|
Change Control Documentation |
|
|
1253 | (1) |
|
|
1254 | (8) |
|
|
1262 | (1) |
|
Network and Resource Availability |
|
|
1263 | (14) |
|
Mean Time Between Failures |
|
|
1264 | (1) |
|
|
1264 | (1) |
|
|
1265 | (8) |
|
|
1273 | (3) |
|
|
1276 | (1) |
|
|
1277 | (2) |
|
|
1279 | (16) |
|
|
1281 | (2) |
|
|
1283 | (2) |
|
|
1285 | (10) |
|
|
1295 | (12) |
|
|
1298 | (4) |
|
|
1302 | (1) |
|
Other Vulnerability Types |
|
|
1303 | (2) |
|
|
1305 | (2) |
|
|
1307 | (1) |
|
|
1307 | (12) |
|
|
1309 | (6) |
|
|
1315 | (4) |
|
Appendix A Comprehensive Questions |
|
|
1319 | (60) |
|
|
1357 | (22) |
|
Appendix B About the CD-ROM |
|
|
1379 | (6) |
|
Running the QuickTime Cryptography Video Sample |
|
|
1380 | (1) |
|
|
1380 | (1) |
|
Total Tester CISSP Practice Exam Software |
|
|
1381 | (1) |
|
Total Tester System Requirements |
|
|
1381 | (1) |
|
Installing and Running Total Tester |
|
|
1381 | (1) |
|
Adobe Digital Edition eBook |
|
|
1381 | |
|
|
1383 | |
Index |
|
1385 | |
Preface |
|
ix | |
Introduction |
|
xi | |
|
Chapter 1 Information Security Governance and Risk Management |
|
|
1 | (44) |
|
|
45 | (46) |
|
Chapter 3 Security Architecture and Design |
|
|
91 | (48) |
|
Chapter 4 Physical and Environmental Security |
|
|
139 | (44) |
|
Chapter 5 Telecommunications and Network Security |
|
|
183 | (44) |
|
|
227 | (44) |
|
Chapter 7 Business Continuity and Disaster Recovery |
|
|
271 | (48) |
|
Chapter 8 Legal, Regulations, Investigations, and Compliance |
|
|
319 | (40) |
|
Chapter 9 Software Development Security |
|
|
359 | (44) |
|
Chapter 10 Security Operations |
|
|
403 | (40) |
Appendix About the Free Online Practice Questions and Audio Lectures |
|
443 | (2) |
Index |
|
445 | |