Introduction |
|
xxvii | |
Chapter 1 Threats, Attacks, and Vulnerabilities |
|
1 | (102) |
|
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware |
|
|
6 | (9) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
1.2 Compare and contrast types of attacks |
|
|
15 | (54) |
|
|
15 | (6) |
|
Application/service attacks |
|
|
21 | (24) |
|
|
45 | (9) |
|
|
54 | (9) |
|
|
63 | (6) |
|
1.3 Explain threat actor types and attributes |
|
|
69 | (5) |
|
|
69 | (3) |
|
|
72 | (1) |
|
Use of open-source intelligence |
|
|
73 | (1) |
|
|
73 | (1) |
|
1.4 Explain penetration testing concepts |
|
|
74 | (8) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
Pen testing vs. vulnerability scanning |
|
|
78 | (3) |
|
|
81 | (1) |
|
1.5 Explain vulnerability scanning concepts |
|
|
82 | (5) |
|
Passively test security controls |
|
|
84 | (1) |
|
|
84 | (1) |
|
Identify lack of security controls |
|
|
84 | (1) |
|
Identify common misconfigurations |
|
|
85 | (1) |
|
Intrusive vs. non-intrusive |
|
|
85 | (1) |
|
Credentialed vs. non-credentialed |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
1.6 Explain the impact associated with types of vulnerabilities |
|
|
87 | (11) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
Misconfiguration/Weak configuration |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
Improperly configured accounts |
|
|
91 | (1) |
|
Vulnerable business processes |
|
|
91 | (1) |
|
Weak cipher suites and implementations |
|
|
91 | (1) |
|
Memory/Buffer vulnerability |
|
|
92 | (1) |
|
System sprawl/undocumented assets |
|
|
93 | (1) |
|
Architecture/Design weaknesses |
|
|
94 | (1) |
|
|
94 | (1) |
|
Improper certificate and key management |
|
|
95 | (1) |
|
|
95 | (3) |
|
|
98 | (5) |
Chapter 2 Technologies and Tools |
|
103 | (134) |
|
2.1 Install and configure network components, both hardware-and software-based, to support organizational security |
|
|
110 | (42) |
|
|
110 | (4) |
|
|
114 | (4) |
|
|
118 | (7) |
|
|
125 | (2) |
|
|
127 | (3) |
|
|
130 | (1) |
|
|
131 | (2) |
|
|
133 | (6) |
|
|
139 | (3) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
144 | (3) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (4) |
|
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization |
|
|
152 | (18) |
|
|
152 | (2) |
|
|
154 | (1) |
|
Wireless scanners/cracker |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
Configuration compliance scanner |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (8) |
|
|
169 | (1) |
|
2.3 Given a scenario, troubleshoot common security issues |
|
|
170 | (10) |
|
Unencrypted credentials/clear text |
|
|
170 | (1) |
|
Logs and events anomalies |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
Weak security configurations |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
License compliance violation (availability/integrity) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
2.4 Given a scenario, analyze and interpret output from security technologies |
|
|
180 | (10) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
Data execution prevention |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
2.5 Given a scenario, deploy mobile devices securely |
|
|
190 | (23) |
|
|
190 | (3) |
|
Mobile device management concepts |
|
|
193 | (8) |
|
Enforcement and monitoring for: |
|
|
201 | (6) |
|
|
207 | (3) |
|
|
210 | (3) |
|
2.6 Given a scenario, implement secure protocols |
|
|
213 | (20) |
|
|
213 | (11) |
|
|
224 | (7) |
|
|
231 | (2) |
|
|
233 | (4) |
Chapter 3 Architecture and Design |
|
237 | (110) |
|
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides |
|
|
244 | (5) |
|
Industry-standard frameworks and reference architectures |
|
|
244 | (2) |
|
Benchmarks/secure configuration guides |
|
|
246 | (2) |
|
Defense-in-depth/layered security |
|
|
248 | (1) |
|
|
249 | (1) |
|
3.2 Given a scenario, implement secure network architecture concepts |
|
|
249 | (19) |
|
|
250 | (5) |
|
Segregation/segmentation/isolation |
|
|
255 | (3) |
|
|
258 | (3) |
|
Security device/technology placement |
|
|
261 | (4) |
|
|
265 | (1) |
|
|
266 | (2) |
|
3.3 Given a scenario, implement secure systems design |
|
|
268 | (16) |
|
Hardware/firmware security |
|
|
268 | (4) |
|
|
272 | (8) |
|
|
280 | (2) |
|
|
282 | (2) |
|
3.4 Explain the importance of secure staging deployment concepts |
|
|
284 | (4) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
285 | (3) |
|
|
288 | (1) |
|
|
288 | (1) |
|
3.5 Explain the security implications of embedded systems |
|
|
288 | (9) |
|
|
289 | (1) |
|
|
290 | (3) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
296 | (1) |
|
3.6 Summarize secure application development and deployment concepts |
|
|
297 | (14) |
|
Development life-cycle models |
|
|
297 | (3) |
|
|
300 | (2) |
|
Version control and change management |
|
|
302 | (1) |
|
Provisioning and deprovisioning |
|
|
303 | (1) |
|
|
303 | (3) |
|
|
306 | (2) |
|
Compiled vs. runtime code |
|
|
308 | (1) |
|
|
309 | (2) |
|
3.7 Summarize cloud and virtualization concepts |
|
|
311 | (8) |
|
|
312 | (2) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
315 | (2) |
|
On-premise vs. hosted vs. cloud |
|
|
317 | (1) |
|
|
317 | (1) |
|
Cloud access security broker |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
3.8 Explain how resiliency and automation strategies reduce risk |
|
|
319 | (9) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (2) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (2) |
|
|
326 | (1) |
|
|
326 | (2) |
|
3.9 Explain the importance of physical security controls |
|
|
328 | (19) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (2) |
|
|
333 | (1) |
|
Secure Cabinets/Enclosures |
|
|
333 | (1) |
|
Protected Distribution/Protected Cabling |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (2) |
|
|
338 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (2) |
|
|
343 | (4) |
Chapter 4 Identity and Access Management |
|
347 | (52) |
|
4.1 Compare and contrast identity and access management concepts |
|
|
350 | (5) |
|
Identification, authentication, authorization and accounting (AAA) |
|
|
350 | (2) |
|
Multifactor authentication |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
354 | (1) |
|
4.2 Given a scenario, install and configure identity and access services |
|
|
355 | (10) |
|
|
355 | (1) |
|
|
355 | (2) |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
4.3 Given a scenario, implement identity and access management controls |
|
|
365 | (17) |
|
|
365 | (4) |
|
|
369 | (1) |
|
|
369 | (3) |
|
|
372 | (2) |
|
Certificate-based authentication |
|
|
374 | (2) |
|
|
376 | (1) |
|
|
376 | (4) |
|
|
380 | (2) |
|
4.4 Given a scenario, differentiate common account management practices |
|
|
382 | (13) |
|
|
382 | (2) |
|
|
384 | (3) |
|
Account policy enforcement |
|
|
387 | (6) |
|
|
393 | (2) |
|
|
395 | (4) |
Chapter 5 Risk Management |
|
399 | (82) |
|
5.1 Explain the importance of policies, plans and procedures related to organizational security |
|
|
405 | (15) |
|
Standard operating procedure |
|
|
405 | (1) |
|
|
405 | (2) |
|
|
407 | (9) |
|
General security policies |
|
|
416 | (2) |
|
|
418 | (2) |
|
5.2 Summarize business impact analysis concepts |
|
|
420 | (5) |
|
|
420 | (1) |
|
|
421 | (1) |
|
|
421 | (1) |
|
Mission-essential functions |
|
|
421 | (1) |
|
Identification of critical systems |
|
|
422 | (1) |
|
|
422 | (1) |
|
|
422 | (1) |
|
Privacy impact assessment |
|
|
423 | (1) |
|
Privacy threshold assessment |
|
|
423 | (1) |
|
|
424 | (1) |
|
5.3 Explain risk management processes and concepts |
|
|
425 | (11) |
|
|
425 | (1) |
|
|
426 | (8) |
|
|
434 | (1) |
|
|
434 | (2) |
|
5.4 Given a scenario, follow incident response procedures |
|
|
436 | (6) |
|
|
436 | (2) |
|
Incident response process |
|
|
438 | (3) |
|
|
441 | (1) |
|
5.5 Summarize basic concepts of forensics |
|
|
442 | (7) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
444 | (1) |
|
|
444 | (3) |
|
|
447 | (1) |
|
|
447 | (1) |
|
Strategic intelligence/counterintelligence gathering |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
|
5.6 Explain disaster recovery and continuity of operation concepts |
|
|
449 | (12) |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
455 | (1) |
|
Geographic considerations |
|
|
456 | (2) |
|
Continuity of operation planning |
|
|
458 | (2) |
|
|
460 | (1) |
|
5.7 Compare and contrast various types of controls |
|
|
461 | (3) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
5.8 Given a scenario, carry out data security and privacy practices |
|
|
464 | (12) |
|
Data destruction and media sanitization |
|
|
464 | (3) |
|
Data sensitivity labeling and handling |
|
|
467 | (6) |
|
|
473 | (1) |
|
|
474 | (1) |
|
|
474 | (1) |
|
|
475 | (1) |
|
|
476 | (5) |
Chapter 6 Cryptography and PKI |
|
481 | (78) |
|
6.1 Compare and contrast basic concepts of cryptography |
|
|
486 | (26) |
|
|
487 | (2) |
|
|
489 | (1) |
|
|
490 | (3) |
|
|
493 | (3) |
|
|
496 | (1) |
|
|
496 | (1) |
|
Weak/Deprecated Algorithms |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
497 | (2) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
502 | (1) |
|
|
503 | (1) |
|
Random/Pseudo-Random Number Generation |
|
|
503 | (1) |
|
|
504 | (1) |
|
Implementation vs. algorithm selection |
|
|
504 | (1) |
|
|
505 | (1) |
|
Security through obscurity |
|
|
505 | (1) |
|
|
505 | (4) |
|
|
509 | (3) |
|
6.2 Explain cryptography algorithms and their basic characteristics |
|
|
512 | (15) |
|
|
513 | (2) |
|
|
515 | (1) |
|
|
516 | (3) |
|
|
519 | (2) |
|
Key stretching algorithms |
|
|
521 | (1) |
|
|
522 | (3) |
|
|
525 | (2) |
|
6.3 Given a scenario, install and configure wireless security settings |
|
|
527 | (5) |
|
|
527 | (2) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
531 | (1) |
|
6.4 Given a scenario, implement public key infrastructure |
|
|
532 | (27) |
|
|
532 | (7) |
|
|
539 | (8) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
549 | (5) |
|
|
554 | (5) |
Appendix Answers to Review Questions |
|
559 | (16) |
|
Chapter 1 Threats, Attacks, and Vulnerabilities |
|
|
560 | (1) |
|
Chapter 2 Technologies and Tools |
|
|
561 | (3) |
|
Chapter 3 Architecture and Design |
|
|
564 | (2) |
|
Chapter 4 Identity and Access Management |
|
|
566 | (2) |
|
Chapter 5 Risk Management |
|
|
568 | (3) |
|
Chapter 6 Cryptography and PKI |
|
|
571 | (4) |
Index |
|
575 | |
9781337559010 |
|
Preface |
|
xvii | |
About the Author |
|
xix | |
1 What Is Personality? |
|
1 | (12) |
|
The Person and the Situation |
|
|
2 | (1) |
|
|
3 | (1) |
|
Six Approaches to Personality |
|
|
4 | (5) |
|
Two Examples: Aggression and Depression |
|
|
6 | (3) |
|
|
9 | (2) |
|
The Study of Personality: Theory, Application, Assessment, and Research |
|
|
11 | (1) |
|
|
12 | (1) |
2 Personality Research Methods |
|
13 | (20) |
|
The Hypothesis-Testing Approach |
|
|
15 | (7) |
|
|
15 | (2) |
|
|
17 | (2) |
|
Manipulated Versus Nonmanipulated Independent |
|
|
|
|
19 | (2) |
|
Prediction Versus Hindsight |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (2) |
|
Statistical Analysis of Data |
|
|
24 | (4) |
|
|
25 | (1) |
|
|
25 | (3) |
|
|
28 | (3) |
|
|
28 | (1) |
|
|
29 | (2) |
|
|
31 | (2) |
3 The Psychoanalytic Approach: Freudian Theory, Application, and Assessment |
|
33 | (26) |
|
Freud Discovers the Unconscious |
|
|
34 | (3) |
|
The Freudian Theory of Personality |
|
|
37 | (12) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (3) |
|
Psychosexual Stages of Development |
|
|
43 | (3) |
|
Getting at Unconscious Material |
|
|
46 | (3) |
|
Application: Psychoanalysis |
|
|
49 | (2) |
|
Assessment: Projective Tests |
|
|
51 | (4) |
|
Some Popular Projective Tests |
|
|
51 | (2) |
|
Evaluation of Projective Tests |
|
|
53 | (2) |
|
Strengths and Criticisms of Freud's Theory |
|
|
55 | (2) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (2) |
4 The Freudian Approach: Relevant Research |
|
59 | (22) |
|
|
60 | (5) |
|
The Meaning of Dream Content |
|
|
61 | (3) |
|
|
64 | (1) |
|
Interpreting the Evidence |
|
|
65 | (1) |
|
|
65 | (5) |
|
Identifying and Measuring Defense Mechanisms |
|
|
66 | (1) |
|
Developmental Differences |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
70 | (4) |
|
|
70 | (1) |
|
Research on Freud's Theory of Humor |
|
|
71 | (3) |
|
|
74 | (6) |
|
|
75 | (3) |
|
|
78 | (2) |
|
|
80 | (1) |
5 The Psychoanalytic Approach: Neo-Freudian Theory, Application, and Assessment |
|
81 | (28) |
|
Limits and Liabilities of Freudian Theory |
|
|
83 | (1) |
|
|
83 | (4) |
|
|
84 | (1) |
|
Parental Influence on Personality Development |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (4) |
|
The Collective Unconscious |
|
|
88 | (1) |
|
Some Important Archetypes |
|
|
88 | (1) |
|
Evidence for the Collective Unconscious |
|
|
89 | (2) |
|
|
91 | (5) |
|
Personality Development Throughout the Life Cycle |
|
|
92 | (4) |
|
|
96 | (5) |
|
|
97 | (3) |
|
|
100 | (1) |
|
Application: Psychoanalytic Theory and Religion |
|
|
101 | (2) |
|
Assessment: Personal Narratives |
|
|
103 | (2) |
|
Measuring Personality with Personal Narratives |
|
|
103 | (1) |
|
Generativity and Life Stories |
|
|
104 | (1) |
|
Strengths and Criticisms of Neo-Freudian Theories |
|
|
105 | (2) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (2) |
6 The Neo-Freudian Theories: Relevant Research |
|
109 | (25) |
|
Anxiety and Coping Strategies |
|
|
110 | (8) |
|
|
112 | (1) |
|
Types of Coping Strategies |
|
|
112 | (2) |
|
How Effective Are Coping Strategies? |
|
|
114 | (2) |
|
Coping Flexibility and Resilience |
|
|
116 | (2) |
|
Psychoanalytic Concepts and Aggression |
|
|
118 | (6) |
|
Frustration and Aggression |
|
|
119 | (2) |
|
|
121 | (2) |
|
|
123 | (1) |
|
Attachment Style and Adult Relationships |
|
|
124 | (8) |
|
Object Relations Theory and Attachment Theory |
|
|
125 | (1) |
|
|
126 | (2) |
|
Alternate Models and Measurement |
|
|
128 | (1) |
|
Attachment Style and Romantic Relationships |
|
|
129 | (3) |
|
|
132 | (2) |
7 The Trait Approach: Theory, Application, and Assessment |
|
134 | (31) |
|
|
135 | (2) |
|
Important Trait Theorists |
|
|
137 | (3) |
|
|
137 | (3) |
|
|
140 | (1) |
|
Factor Analysis and the Search for the Structure of Personality |
|
|
140 | (9) |
|
|
142 | (5) |
|
Ongoing Questions Related to the Big Five Model |
|
|
147 | (2) |
|
The Situation Versus Trait Controversy |
|
|
149 | (4) |
|
Criticism of the Trait Approach |
|
|
149 | (2) |
|
In Defense of Personality Traits |
|
|
151 | (2) |
|
Application: The Big Five in the Workplace |
|
|
153 | (2) |
|
Assessment: Self-Report Inventories |
|
|
155 | (6) |
|
The Minnesota Multiphasic Personality Inventory |
|
|
156 | (1) |
|
Problems with Self-Report Inventories |
|
|
156 | (5) |
|
Strengths and Criticisms of the Trait Approach |
|
|
161 | (2) |
|
|
161 | (1) |
|
|
161 | (2) |
|
|
163 | (2) |
8 The Trait Approach: Relevant Research |
|
165 | (34) |
|
|
166 | (8) |
|
Gender, Culture, and Achievement |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (4) |
|
Type A, Hostility and Health |
|
|
174 | (5) |
|
Type A as a Personality Variable |
|
|
175 | (1) |
|
|
176 | (3) |
|
|
179 | (5) |
|
Characteristics of Socially Anxious People |
|
|
181 | (2) |
|
Explaining Social Anxiety |
|
|
183 | (1) |
|
|
184 | (9) |
|
|
185 | (3) |
|
|
188 | (2) |
|
|
190 | (3) |
|
|
193 | (4) |
|
|
194 | (2) |
|
|
196 | (1) |
|
|
197 | (2) |
9 The Biological Approach: Theory, Application, and Assessment |
|
199 | (28) |
|
Hans Eysenck's Theory of Personality |
|
|
201 | (7) |
|
The Structure of Personality |
|
|
201 | (2) |
|
A Biological Basis for Personality |
|
|
203 | (1) |
|
Physiological Differences: Stimulation Sensitivity and Behavioral Activation/Inhibition Systems |
|
|
204 | (4) |
|
|
208 | (5) |
|
Temperament and Personality |
|
|
208 | (2) |
|
Inhibited and Uninhibited Children |
|
|
210 | (3) |
|
Evolutionary Personality Psychology |
|
|
213 | (3) |
|
Natural Selection and Psychological Mechanisms |
|
|
214 | (1) |
|
Anxiety and Social Exclusion |
|
|
215 | (1) |
|
Application: Children's Temperaments and School |
|
|
216 | (3) |
|
Temperament and Academic Performance |
|
|
217 | (1) |
|
Matching Temperament and Teaching |
|
|
218 | (1) |
|
Assessment: Brain Electrical Activity and Cerebral Asymmetry |
|
|
219 | (4) |
|
|
219 | (1) |
|
|
220 | (1) |
|
Individual Differences in Cerebral Asymmetry |
|
|
221 | (2) |
|
Strengths and Criticisms of the Biological Approach |
|
|
223 | (2) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (2) |
10 The Biological Approach: Relevant Research |
|
227 | (25) |
|
Heritability of Personality Traits |
|
|
228 | (7) |
|
Separating Environmental from Genetic Influences |
|
|
229 | (5) |
|
Interpreting the Heritability Findings |
|
|
234 | (1) |
|
Extraversion-Introversion |
|
|
235 | (7) |
|
The Heritability of Extraversion |
|
|
236 | (2) |
|
Extraversion and Preferred Arousal Level |
|
|
238 | (1) |
|
Extraversion and Happiness |
|
|
239 | (3) |
|
Evolutionary Personality Theory and Mate Selection |
|
|
242 | (9) |
|
What Men Look for in Women |
|
|
243 | (4) |
|
What Women Look for in Men |
|
|
247 | (3) |
|
Conclusions and Limitations |
|
|
250 | (1) |
|
|
251 | (1) |
11 The Humanistic Approach: Theory, Application, and Assessment |
|
252 | (28) |
|
The Roots of Humanistic Psychology |
|
|
254 | (1) |
|
Key Elements of the Humanistic Approach |
|
|
255 | (2) |
|
|
255 | (1) |
|
|
256 | (1) |
|
The Experience of the Individual |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (4) |
|
The Fully Functioning Person |
|
|
257 | (2) |
|
|
259 | (1) |
|
Conditions of Worth and Unconditional Positive Regard |
|
|
260 | (1) |
|
|
261 | (6) |
|
Motivation and the Hierarchy of Needs |
|
|
261 | (4) |
|
Misconceptions About Maslow's Need Hierarchy |
|
|
265 | (1) |
|
The Study of Psychologically Healthy People |
|
|
265 | (2) |
|
The Psychology of Optimal Experience |
|
|
267 | (3) |
|
|
267 | (1) |
|
Finding Happiness in Everyday Activities |
|
|
268 | (2) |
|
Application: Person-Centered Therapy |
|
|
270 | (2) |
|
Assessment: The Q-Sort Technique |
|
|
272 | (4) |
|
Strengths and Criticisms of the Humanistic Approach |
|
|
276 | (2) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
278 | (2) |
12 The Humanistic Approach: Relevant Research |
|
280 | (30) |
|
|
281 | (7) |
|
|
283 | (1) |
|
Self-Disclosure Among Friends and Romantic Partners |
|
|
284 | (1) |
|
Disclosing Men and Disclosing Women |
|
|
285 | (1) |
|
Disclosing Traumatic Experiences |
|
|
285 | (3) |
|
|
288 | (6) |
|
Chronically Lonely People |
|
|
291 | (2) |
|
|
293 | (1) |
|
|
294 | (8) |
|
Self-Esteem and Reaction to Failure |
|
|
295 | (2) |
|
Contingencies of Self-Worth |
|
|
297 | (3) |
|
|
300 | (2) |
|
|
302 | (7) |
|
|
303 | (3) |
|
Individual Differences in Preference for Solitude |
|
|
306 | (3) |
|
|
309 | (1) |
13 The Behavioral/Social Learning Approach: Theory, Application, and Assessment |
|
310 | (30) |
|
|
311 | (4) |
|
Basic Principles of Conditioning |
|
|
315 | (5) |
|
|
315 | (1) |
|
|
316 | (4) |
|
|
320 | (2) |
|
|
322 | (5) |
|
|
323 | (1) |
|
Imagination and Self-Regulation |
|
|
324 | (1) |
|
|
324 | (3) |
|
Application: Conditioning Principles and Self-Efficacy in Psychotherapy |
|
|
327 | (6) |
|
Behavioral Explanations of Psychological Disorders |
|
|
327 | (2) |
|
Using Conditioning Principles in Psychotherapy |
|
|
329 | (2) |
|
|
331 | (2) |
|
Assessment: Behavior Observation Methods |
|
|
333 | (3) |
|
|
334 | (1) |
|
|
334 | (2) |
|
|
336 | (1) |
|
Strengths and Criticisms of the Behavioral/Social Learning |
|
|
|
|
336 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (2) |
14 The Behavioral/Social Learning Approach: Relevant Research |
|
340 | (35) |
|
|
341 | (11) |
|
Individual Differences: Masculinity and Femininity |
|
|
343 | (2) |
|
Gender Type and Well-Being |
|
|
345 | (1) |
|
Gender Type and Interpersonal Relationships |
|
|
346 | (3) |
|
Social Pressure to Act Masculine or Feminine |
|
|
349 | (1) |
|
Unmitigated Agency and Unmitigated Communion |
|
|
350 | (2) |
|
Observational Learning of Aggression |
|
|
352 | (8) |
|
Bandura's Four-Step Model |
|
|
352 | (4) |
|
Mass Media Aggression and Aggressive Behavior |
|
|
356 | (2) |
|
|
358 | (2) |
|
|
360 | (6) |
|
|
361 | (1) |
|
Learned Helplessness in Humans |
|
|
362 | (1) |
|
Some Applications of Learned Helplessness |
|
|
362 | (4) |
|
|
366 | (7) |
|
Locus of Control and Well-Being |
|
|
367 | (3) |
|
Locus of Control and Health |
|
|
370 | (3) |
|
|
373 | (2) |
15 The Cognitive Approach: Theory, Application, and Assessment |
|
375 | (21) |
|
Personal Construct Theory |
|
|
376 | (4) |
|
Personal Construct Systems |
|
|
377 | (2) |
|
Inadequate Personal Constructs |
|
|
379 | (1) |
|
Cognitive Personality Variables |
|
|
380 | (1) |
|
Cognitive Representations of the Self |
|
|
381 | (6) |
|
|
381 | (5) |
|
|
386 | (1) |
|
Application: Cognitive (Behavior) Psychotherapy |
|
|
387 | (4) |
|
Rational Emotive (Behavior) Therapy |
|
|
388 | (3) |
|
Assessment: The Repertory Grid Technique |
|
|
391 | (3) |
|
Strengths and Criticisms of the Cognitive Approach |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
395 | (1) |
16 The Cognitive Approach: Relevant Research |
|
396 | (19) |
|
Cognitions and Aggression |
|
|
397 | (5) |
|
|
397 | (3) |
|
Reactive Aggression in Boys |
|
|
400 | (2) |
|
Gender, Memory, and Self-Construal |
|
|
402 | (5) |
|
|
402 | (2) |
|
Memories About Relationships |
|
|
404 | (3) |
|
Cognitions and Depression |
|
|
407 | (7) |
|
|
408 | (3) |
|
|
411 | (3) |
|
|
414 | (1) |
Appendix |
|
415 | (4) |
Glossary |
|
419 | (2) |
References |
|
421 | (66) |
Name Index |
|
487 | (18) |
Subject Index |
|
505 | |