Atnaujinkite slapukų nuostatas

CompTIA Securityplus Review Guide: Exam SY0501 [Minkštas viršelis]

3.70/5 (13 ratings by Goodreads)
  • Formatas: Paperback / softback, 672 pages, aukštis x plotis x storis: 228x193x38 mm, weight: 912 g
  • Išleidimo metai: 26-Dec-2017
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1119416949
  • ISBN-13: 9781119416944
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 672 pages, aukštis x plotis x storis: 228x193x38 mm, weight: 912 g
  • Išleidimo metai: 26-Dec-2017
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1119416949
  • ISBN-13: 9781119416944
Kitos knygos pagal šią temą:
Consolidate your knowledge base with critical Security+ review

CompTIA Security+ Review Guide, Fourth Edition, is the smart candidate's secret weapon for passing Exam SY0-501 with flying colors. You've worked through your study guide, but are you sure you're prepared? This book provides tight, concise reviews of all essential topics throughout each of the exam's six domains to help you reinforce what you know. Take the pre-assessment test to identify your weak areas while there is still time to review, and use your remaining prep time to turn weaknesses into strengths. The Sybex online learning environment gives you access to portable study aids, including electronic flashcards and a glossary of key terms, so you can review on the go. Hundreds of practice questions allow you to gauge your readiness, and give you a preview of the big day.

Avoid exam-day surprises by reviewing with the makers of the test—this review guide is fully approved and endorsed by CompTIA, so you can be sure that it accurately reflects the latest version of the exam. The perfect companion to the CompTIA Security+ Study Guide, Seventh Edition, this review guide can be used with any study guide to help you:

  • Review the critical points of each exam topic area
  • Ensure your understanding of how concepts translate into tasks
  • Brush up on essential terminology, processes, and skills
  • Test your readiness with hundreds of practice questions

You've put in the time, gained hands-on experience, and now it's time to prove what you know. The CompTIA Security+ certification tells employers that you're the person they need to keep their data secure; with threats becoming more and more sophisticated, the demand for your skills will only continue to grow. Don't leave anything to chance on exam day—be absolutely sure you're prepared with the CompTIA Security+ Review Guide, Fourth Edition.

Introduction xxvii
Chapter 1 Threats, Attacks, and Vulnerabilities 1(102)
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware
6(9)
Viruses
6(1)
Crypto-malware
7(1)
Ransomware
8(1)
Worm
8(1)
Trojan
8(1)
Rootkit
9(1)
Keylogger
10(1)
Adware
10(1)
Spyware
10(1)
Bots
11(1)
RAT
12(1)
Logic bomb
12(1)
Backdoor
13(1)
Exam Essentials
14(1)
1.2 Compare and contrast types of attacks
15(54)
Social engineering
15(6)
Application/service attacks
21(24)
Wireless attacks
45(9)
Cryptographic attacks
54(9)
Exam Essentials
63(6)
1.3 Explain threat actor types and attributes
69(5)
Types of actors
69(3)
Attributes of actors
72(1)
Use of open-source intelligence
73(1)
Exam Essentials
73(1)
1.4 Explain penetration testing concepts
74(8)
Active reconnaissance
75(1)
Passive reconnaissance
75(1)
Pivot
76(1)
Initial exploitation
76(1)
Persistence
77(1)
Escalation of privilege
77(1)
Black box
77(1)
White box
77(1)
Gray box
78(1)
Pen testing vs. vulnerability scanning
78(3)
Exam Essentials
81(1)
1.5 Explain vulnerability scanning concepts
82(5)
Passively test security controls
84(1)
Identify vulnerability
84(1)
Identify lack of security controls
84(1)
Identify common misconfigurations
85(1)
Intrusive vs. non-intrusive
85(1)
Credentialed vs. non-credentialed
85(1)
False positive
85(1)
Exam Essentials
86(1)
1.6 Explain the impact associated with types of vulnerabilities
87(11)
Race conditions
87(1)
Vulnerabilities due to:
88(1)
Improper input handling
89(1)
Improper error handling
89(1)
Misconfiguration/Weak configuration
90(1)
Default configuration
90(1)
Resource exhaustion
91(1)
Untrained users
91(1)
Improperly configured accounts
91(1)
Vulnerable business processes
91(1)
Weak cipher suites and implementations
91(1)
Memory/Buffer vulnerability
92(1)
System sprawl/undocumented assets
93(1)
Architecture/Design weaknesses
94(1)
New threats/zero day
94(1)
Improper certificate and key management
95(1)
Exam Essentials
95(3)
Review Questions
98(5)
Chapter 2 Technologies and Tools 103(134)
2.1 Install and configure network components, both hardware-and software-based, to support organizational security
110(42)
Firewall
110(4)
VPN concentrator
114(4)
NIPS/NIDS
118(7)
Router
125(2)
Switch
127(3)
Proxy
130(1)
Load balancer
131(2)
Access point
133(6)
SIEM
139(3)
DLP
142(1)
NAC
143(1)
Mail gateway
144(3)
Bridge
147(1)
SSL/TLS accelerators
147(1)
SSL decryptors
147(1)
Media gateway
147(1)
Hardware security module
148(1)
Exam Essentials
148(4)
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization
152(18)
Protocol analyzer
152(2)
Network scanners
154(1)
Wireless scanners/cracker
155(1)
Password cracker
155(1)
Vulnerability scanner
156(1)
Configuration compliance scanner
157(1)
Exploitation frameworks
157(1)
Data sanitization tools
158(1)
Steganography tools
158(1)
Honeypot
158(1)
Backup utilities
159(1)
Banner grabbing
159(1)
Passive vs. active
160(1)
Command line tools
161(8)
Exam Essentials
169(1)
2.3 Given a scenario, troubleshoot common security issues
170(10)
Unencrypted credentials/clear text
170(1)
Logs and events anomalies
171(1)
Permission issues
172(1)
Access violations
172(1)
Certificate issues
173(1)
Data exfiltration
173(1)
Misconfigured devices
174(1)
Weak security configurations
175(1)
Personnel issues
176(1)
Unauthorized software
177(1)
Baseline deviation
178(1)
License compliance violation (availability/integrity)
178(1)
Asset management
178(1)
Authentication issues
179(1)
Exam Essentials
179(1)
2.4 Given a scenario, analyze and interpret output from security technologies
180(10)
HIDS/HIPS
180(1)
Antivirus
181(1)
File integrity check
182(1)
Host-based firewall
183(1)
Application whitelisting
183(1)
Removable media control
184(1)
Advanced malware tools
185(1)
Patch management tools
186(1)
UTM
187(1)
DLP
187(1)
Data execution prevention
188(1)
Web application firewall
188(1)
Exam Essentials
189(1)
2.5 Given a scenario, deploy mobile devices securely
190(23)
Connection methods
190(3)
Mobile device management concepts
193(8)
Enforcement and monitoring for:
201(6)
Deployment models
207(3)
Exam Essentials
210(3)
2.6 Given a scenario, implement secure protocols
213(20)
Protocols
213(11)
Use cases
224(7)
Exam Essentials
231(2)
Review Questions
233(4)
Chapter 3 Architecture and Design 237(110)
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides
244(5)
Industry-standard frameworks and reference architectures
244(2)
Benchmarks/secure configuration guides
246(2)
Defense-in-depth/layered security
248(1)
Exam Essentials
249(1)
3.2 Given a scenario, implement secure network architecture concepts
249(19)
Zones/topologies
250(5)
Segregation/segmentation/isolation
255(3)
Tunneling/VPN
258(3)
Security device/technology placement
261(4)
SDN
265(1)
Exam Essentials
266(2)
3.3 Given a scenario, implement secure systems design
268(16)
Hardware/firmware security
268(4)
Operating systems
272(8)
Peripherals
280(2)
Exam Essentials
282(2)
3.4 Explain the importance of secure staging deployment concepts
284(4)
Sandboxing
284(1)
Environment
284(1)
Secure baseline
285(3)
Integrity measurement
288(1)
Exam Essentials
288(1)
3.5 Explain the security implications of embedded systems
288(9)
SCADA/ICS
289(1)
Smart devices/1°T
290(3)
HVAC
293(1)
SoC
293(1)
RTOS
294(1)
Printers/MFDs
294(1)
Camera systems
294(1)
Special purpose
295(1)
Exam Essentials
296(1)
3.6 Summarize secure application development and deployment concepts
297(14)
Development life-cycle models
297(3)
Secure DevOps
300(2)
Version control and change management
302(1)
Provisioning and deprovisioning
303(1)
Secure coding techniques
303(3)
Code quality and testing
306(2)
Compiled vs. runtime code
308(1)
Exam Essentials
309(2)
3.7 Summarize cloud and virtualization concepts
311(8)
Hypervisor
312(2)
VM sprawl avoidance
314(1)
VM escape protection
314(1)
Cloud storage
315(1)
Cloud deployment models
315(2)
On-premise vs. hosted vs. cloud
317(1)
VDI/VDE
317(1)
Cloud access security broker
317(1)
Security as a Service
317(1)
Exam Essentials
318(1)
3.8 Explain how resiliency and automation strategies reduce risk
319(9)
Automation/scripting
319(1)
Templates
320(1)
Master image
320(1)
Non-persistence
320(2)
Elasticity
322(1)
Scalability
322(1)
Distributive allocation
322(1)
Redundancy
322(1)
Fault tolerance
323(1)
High availability
324(2)
RAID
326(1)
Exam Essentials
326(2)
3.9 Explain the importance of physical security controls
328(19)
Lighting
329(1)
Signs
329(1)
Fencing/Gate/Cage
330(1)
Security guards
330(1)
Alarms
331(2)
Safe
333(1)
Secure Cabinets/Enclosures
333(1)
Protected Distribution/Protected Cabling
333(1)
Airgap
333(1)
Mantrap
333(1)
Faraday cage
334(1)
Lock types
335(1)
Biometrics
335(1)
Barricades/Bollards
336(1)
Tokens/Cards
336(1)
Environmental controls
336(2)
Cable locks
338(1)
Screen filters
338(1)
Cameras
339(1)
Motion detection
340(1)
Logs
340(1)
Infrared detection
340(1)
Key management
340(1)
Exam Essentials
341(2)
Review Questions
343(4)
Chapter 4 Identity and Access Management 347(52)
4.1 Compare and contrast identity and access management concepts
350(5)
Identification, authentication, authorization and accounting (AAA)
350(2)
Multifactor authentication
352(1)
Federation
353(1)
Single sign-on
353(1)
Transitive trust
354(1)
Exam Essentials
354(1)
4.2 Given a scenario, install and configure identity and access services
355(10)
LDAP
355(1)
Kerberos
355(2)
TACACS+
357(1)
CHAP
358(1)
PAP
359(1)
MSCHAP
359(1)
RADIUS
360(1)
SAML
361(1)
OpenID Connect
362(1)
OAuth
362(1)
Shibboleth
362(1)
Secure token
362(1)
NTLM
363(1)
Exam Essentials
364(1)
4.3 Given a scenario, implement identity and access management controls
365(17)
Access control models
365(4)
Physical access control
369(1)
Biometric factors
369(3)
Tokens
372(2)
Certificate-based authentication
374(2)
File system security
376(1)
Database security
376(4)
Exam Essentials
380(2)
4.4 Given a scenario, differentiate common account management practices
382(13)
Account types
382(2)
General Concepts
384(3)
Account policy enforcement
387(6)
Exam Essentials
393(2)
Review Questions
395(4)
Chapter 5 Risk Management 399(82)
5.1 Explain the importance of policies, plans and procedures related to organizational security
405(15)
Standard operating procedure
405(1)
Agreement types
405(2)
Personnel management
407(9)
General security policies
416(2)
Exam Essentials
418(2)
5.2 Summarize business impact analysis concepts
420(5)
RTO/RPO
420(1)
MTBF
421(1)
MTTR
421(1)
Mission-essential functions
421(1)
Identification of critical systems
422(1)
Single point of failure
422(1)
Impact
422(1)
Privacy impact assessment
423(1)
Privacy threshold assessment
423(1)
Exam Essentials
424(1)
5.3 Explain risk management processes and concepts
425(11)
Threat assessment
425(1)
Risk assessment
426(8)
Change management
434(1)
Exam Essentials
434(2)
5.4 Given a scenario, follow incident response procedures
436(6)
Incident response plan
436(2)
Incident response process
438(3)
Exam Essentials
441(1)
5.5 Summarize basic concepts of forensics
442(7)
Order of volatility
443(1)
Chain of custody
443(1)
Legal hold
444(1)
Data acquisition
444(3)
Preservation
447(1)
Recovery
447(1)
Strategic intelligence/counterintelligence gathering
447(1)
Track man-hours
448(1)
Exam Essentials
448(1)
5.6 Explain disaster recovery and continuity of operation concepts
449(12)
Recovery sites
453(1)
Order of restoration
454(1)
Backup concepts
455(1)
Geographic considerations
456(2)
Continuity of operation planning
458(2)
Exam Essentials
460(1)
5.7 Compare and contrast various types of controls
461(3)
Deterrent
461(1)
Preventive
462(1)
Detective
462(1)
Corrective
462(1)
Compensating
463(1)
Technical
463(1)
Administrative
463(1)
Physical
463(1)
Exam Essentials
463(1)
5.8 Given a scenario, carry out data security and privacy practices
464(12)
Data destruction and media sanitization
464(3)
Data sensitivity labeling and handling
467(6)
Data roles
473(1)
Data retention
474(1)
Legal and compliance
474(1)
Exam Essentials
475(1)
Review Questions
476(5)
Chapter 6 Cryptography and PKI 481(78)
6.1 Compare and contrast basic concepts of cryptography
486(26)
Symmetric algorithms
487(2)
Modes of operation
489(1)
Asymmetric algorithms
490(3)
Hashing
493(3)
Salt, IV, nonce
496(1)
Elliptic curve
496(1)
Weak/Deprecated Algorithms
497(1)
Key exchange
497(1)
Digital signatures
497(2)
Diffusion
499(1)
Confusion
499(1)
Collision
499(1)
Steganography
499(1)
Obfuscation
500(1)
Stream vs. block
500(1)
Key strength
501(1)
Session keys
501(1)
Ephemeral key
502(1)
Secret algorithm
502(1)
Data-in-transit
502(1)
Data-at-rest
502(1)
Data-in-use
503(1)
Random/Pseudo-Random Number Generation
503(1)
Key stretching
504(1)
Implementation vs. algorithm selection
504(1)
Perfect forward secrecy
505(1)
Security through obscurity
505(1)
Common use cases
505(4)
Exam Essentials
509(3)
6.2 Explain cryptography algorithms and their basic characteristics
512(15)
Symmetric algorithms
513(2)
Cipher modes
515(1)
Asymmetric algorithms
516(3)
Hashing algorithms
519(2)
Key stretching algorithms
521(1)
Obfuscation
522(3)
Exam Essentials
525(2)
6.3 Given a scenario, install and configure wireless security settings
527(5)
Cryptographic protocols
527(2)
Authentication protocols
529(1)
Methods
530(1)
Exam Essentials
531(1)
6.4 Given a scenario, implement public key infrastructure
532(27)
Components
532(7)
Concepts
539(8)
Types of certificates
547(1)
Certificate formats
548(1)
Exam Essentials
549(5)
Review Questions
554(5)
Appendix Answers to Review Questions 559(16)
Chapter 1 Threats, Attacks, and Vulnerabilities
560(1)
Chapter 2 Technologies and Tools
561(3)
Chapter 3 Architecture and Design
564(2)
Chapter 4 Identity and Access Management
566(2)
Chapter 5 Risk Management
568(3)
Chapter 6 Cryptography and PKI
571(4)
Index 575
9781337559010
Preface xvii
About the Author xix
1 What Is Personality? 1(12)
The Person and the Situation
2(1)
Defining Personality
3(1)
Six Approaches to Personality
4(5)
Two Examples: Aggression and Depression
6(3)
Personality and Culture
9(2)
The Study of Personality: Theory, Application, Assessment, and Research
11(1)
Summary
12(1)
2 Personality Research Methods 13(20)
The Hypothesis-Testing Approach
15(7)
Theories and Hypotheses
15(2)
Experimental Variables
17(2)
Manipulated Versus Nonmanipulated Independent
Variables
19(2)
Prediction Versus Hindsight
21(1)
Replication
21(1)
The Case Study Method
22(2)
Statistical Analysis of Data
24(4)
Statistical Significance
25(1)
Correlation Coefficients
25(3)
Personality Assessment
28(3)
Reliability
28(1)
Validity
29(2)
Summary
31(2)
3 The Psychoanalytic Approach: Freudian Theory, Application, and Assessment 33(26)
Freud Discovers the Unconscious
34(3)
The Freudian Theory of Personality
37(12)
The Topographic Model
37(1)
The Structural Model
38(1)
Libido and Thanatos
39(1)
Defense Mechanisms
40(3)
Psychosexual Stages of Development
43(3)
Getting at Unconscious Material
46(3)
Application: Psychoanalysis
49(2)
Assessment: Projective Tests
51(4)
Some Popular Projective Tests
51(2)
Evaluation of Projective Tests
53(2)
Strengths and Criticisms of Freud's Theory
55(2)
Strengths
55(1)
Criticisms
56(1)
Summary
57(2)
4 The Freudian Approach: Relevant Research 59(22)
Dream Interpretation
60(5)
The Meaning of Dream Content
61(3)
The Function of Dreams
64(1)
Interpreting the Evidence
65(1)
Defense Mechanisms
65(5)
Identifying and Measuring Defense Mechanisms
66(1)
Developmental Differences
67(2)
Defensive Style
69(1)
Humor
70(4)
Freud's Theory of Humor
70(1)
Research on Freud's Theory of Humor
71(3)
Hypnosis
74(6)
What Is Hypnosis?
75(3)
Hypnotic Responsiveness
78(2)
Summary
80(1)
5 The Psychoanalytic Approach: Neo-Freudian Theory, Application, and Assessment 81(28)
Limits and Liabilities of Freudian Theory
83(1)
Alfred Adler
83(4)
Striving for Superiority
84(1)
Parental Influence on Personality Development
85(1)
Birth Order
86(1)
Carl Jung
87(4)
The Collective Unconscious
88(1)
Some Important Archetypes
88(1)
Evidence for the Collective Unconscious
89(2)
Erik Erikson
91(5)
Personality Development Throughout the Life Cycle
92(4)
Karen Horney
96(5)
Neurosis
97(3)
Feminine Psychology
100(1)
Application: Psychoanalytic Theory and Religion
101(2)
Assessment: Personal Narratives
103(2)
Measuring Personality with Personal Narratives
103(1)
Generativity and Life Stories
104(1)
Strengths and Criticisms of Neo-Freudian Theories
105(2)
Strengths
105(1)
Criticisms
106(1)
Summary
107(2)
6 The Neo-Freudian Theories: Relevant Research 109(25)
Anxiety and Coping Strategies
110(8)
Coping with Anxiety
112(1)
Types of Coping Strategies
112(2)
How Effective Are Coping Strategies?
114(2)
Coping Flexibility and Resilience
116(2)
Psychoanalytic Concepts and Aggression
118(6)
Frustration and Aggression
119(2)
Displaced Aggression
121(2)
Catharsis and Aggression
123(1)
Attachment Style and Adult Relationships
124(8)
Object Relations Theory and Attachment Theory
125(1)
Adult Attachment Styles
126(2)
Alternate Models and Measurement
128(1)
Attachment Style and Romantic Relationships
129(3)
Summary
132(2)
7 The Trait Approach: Theory, Application, and Assessment 134(31)
The Trait Approach
135(2)
Important Trait Theorists
137(3)
Gordon Allport
137(3)
Henry Murray
140(1)
Factor Analysis and the Search for the Structure of Personality
140(9)
The Big Five
142(5)
Ongoing Questions Related to the Big Five Model
147(2)
The Situation Versus Trait Controversy
149(4)
Criticism of the Trait Approach
149(2)
In Defense of Personality Traits
151(2)
Application: The Big Five in the Workplace
153(2)
Assessment: Self-Report Inventories
155(6)
The Minnesota Multiphasic Personality Inventory
156(1)
Problems with Self-Report Inventories
156(5)
Strengths and Criticisms of the Trait Approach
161(2)
Strengths
161(1)
Criticisms
161(2)
Summary
163(2)
8 The Trait Approach: Relevant Research 165(34)
Achievement Motivation
166(8)
Gender, Culture, and Achievement
168(1)
Attributions
169(1)
Achievement Goals
170(4)
Type A, Hostility and Health
174(5)
Type A as a Personality Variable
175(1)
Hostility and Health
176(3)
Social Anxiety
179(5)
Characteristics of Socially Anxious People
181(2)
Explaining Social Anxiety
183(1)
Emotions
184(9)
Emotional Affectivity
185(3)
Affect Intensity
188(2)
Emotional Expressiveness
190(3)
Optimism and Pessimism
193(4)
Dealing with Adversity
194(2)
Optimism and Health
196(1)
Summary
197(2)
9 The Biological Approach: Theory, Application, and Assessment 199(28)
Hans Eysenck's Theory of Personality
201(7)
The Structure of Personality
201(2)
A Biological Basis for Personality
203(1)
Physiological Differences: Stimulation Sensitivity and Behavioral Activation/Inhibition Systems
204(4)
Temperament
208(5)
Temperament and Personality
208(2)
Inhibited and Uninhibited Children
210(3)
Evolutionary Personality Psychology
213(3)
Natural Selection and Psychological Mechanisms
214(1)
Anxiety and Social Exclusion
215(1)
Application: Children's Temperaments and School
216(3)
Temperament and Academic Performance
217(1)
Matching Temperament and Teaching
218(1)
Assessment: Brain Electrical Activity and Cerebral Asymmetry
219(4)
Measuring Brain Activity
219(1)
Cerebral Asymmetry
220(1)
Individual Differences in Cerebral Asymmetry
221(2)
Strengths and Criticisms of the Biological Approach
223(2)
Strengths
223(1)
Criticisms
224(1)
Summary
225(2)
10 The Biological Approach: Relevant Research 227(25)
Heritability of Personality Traits
228(7)
Separating Environmental from Genetic Influences
229(5)
Interpreting the Heritability Findings
234(1)
Extraversion-Introversion
235(7)
The Heritability of Extraversion
236(2)
Extraversion and Preferred Arousal Level
238(1)
Extraversion and Happiness
239(3)
Evolutionary Personality Theory and Mate Selection
242(9)
What Men Look for in Women
243(4)
What Women Look for in Men
247(3)
Conclusions and Limitations
250(1)
Summary
251(1)
11 The Humanistic Approach: Theory, Application, and Assessment 252(28)
The Roots of Humanistic Psychology
254(1)
Key Elements of the Humanistic Approach
255(2)
Personal Responsibility
255(1)
The Here and Now
256(1)
The Experience of the Individual
256(1)
Personal Growth
257(1)
Carl Rogers
257(4)
The Fully Functioning Person
257(2)
Anxiety and Defense
259(1)
Conditions of Worth and Unconditional Positive Regard
260(1)
Abraham Maslow
261(6)
Motivation and the Hierarchy of Needs
261(4)
Misconceptions About Maslow's Need Hierarchy
265(1)
The Study of Psychologically Healthy People
265(2)
The Psychology of Optimal Experience
267(3)
Optimal Experience
267(1)
Finding Happiness in Everyday Activities
268(2)
Application: Person-Centered Therapy
270(2)
Assessment: The Q-Sort Technique
272(4)
Strengths and Criticisms of the Humanistic Approach
276(2)
Strengths
276(1)
Criticisms
277(1)
Summary
278(2)
12 The Humanistic Approach: Relevant Research 280(30)
Self-Disclosure
281(7)
Disclosure Reciprocity
283(1)
Self-Disclosure Among Friends and Romantic Partners
284(1)
Disclosing Men and Disclosing Women
285(1)
Disclosing Traumatic Experiences
285(3)
Loneliness
288(6)
Chronically Lonely People
291(2)
The Causes of Loneliness
293(1)
Self-Esteem
294(8)
Self-Esteem and Reaction to Failure
295(2)
Contingencies of Self-Worth
297(3)
Self-Esteem and Culture
300(2)
Solitude
302(7)
Time Alone
303(3)
Individual Differences in Preference for Solitude
306(3)
Summary
309(1)
13 The Behavioral/Social Learning Approach: Theory, Application, and Assessment 310(30)
Behaviorism
311(4)
Basic Principles of Conditioning
315(5)
Classical Conditioning
315(1)
Operant Conditioning
316(4)
Social Learning Theory
320(2)
Social-Cognitive Theory
322(5)
Reciprocal Determinism
323(1)
Imagination and Self-Regulation
324(1)
Observational Learning
324(3)
Application: Conditioning Principles and Self-Efficacy in Psychotherapy
327(6)
Behavioral Explanations of Psychological Disorders
327(2)
Using Conditioning Principles in Psychotherapy
329(2)
Self-Efficacy
331(2)
Assessment: Behavior Observation Methods
333(3)
Direct Observation
334(1)
Self-Monitoring
334(2)
Observation by Others
336(1)
Strengths and Criticisms of the Behavioral/Social Learning
Approach
336(1)
Strengths
336(1)
Criticisms
337(1)
Summary
338(2)
14 The Behavioral/Social Learning Approach: Relevant Research 340(35)
Gender Roles
341(11)
Individual Differences: Masculinity and Femininity
343(2)
Gender Type and Well-Being
345(1)
Gender Type and Interpersonal Relationships
346(3)
Social Pressure to Act Masculine or Feminine
349(1)
Unmitigated Agency and Unmitigated Communion
350(2)
Observational Learning of Aggression
352(8)
Bandura's Four-Step Model
352(4)
Mass Media Aggression and Aggressive Behavior
356(2)
Violent Video Games
358(2)
Learned Helplessness
360(6)
Learning to Be Helpless
361(1)
Learned Helplessness in Humans
362(1)
Some Applications of Learned Helplessness
362(4)
Locus of Control
366(7)
Locus of Control and Well-Being
367(3)
Locus of Control and Health
370(3)
Summary
373(2)
15 The Cognitive Approach: Theory, Application, and Assessment 375(21)
Personal Construct Theory
376(4)
Personal Construct Systems
377(2)
Inadequate Personal Constructs
379(1)
Cognitive Personality Variables
380(1)
Cognitive Representations of the Self
381(6)
Self-Schemas
381(5)
Possible Selves
386(1)
Application: Cognitive (Behavior) Psychotherapy
387(4)
Rational Emotive (Behavior) Therapy
388(3)
Assessment: The Repertory Grid Technique
391(3)
Strengths and Criticisms of the Cognitive Approach
394(1)
Strengths
394(1)
Criticisms
394(1)
Summary
395(1)
16 The Cognitive Approach: Relevant Research 396(19)
Cognitions and Aggression
397(5)
General Aggression Model
397(3)
Reactive Aggression in Boys
400(2)
Gender, Memory, and Self-Construal
402(5)
Emotional Memories
402(2)
Memories About Relationships
404(3)
Cognitions and Depression
407(7)
Negative Schemas
408(3)
Negative Cognitive Style
411(3)
Summary
414(1)
Appendix 415(4)
Glossary 419(2)
References 421(66)
Name Index 487(18)
Subject Index 505
James Michael Stewart, Security+, CISSP, CEH, CHFI, is a security expert, writer, trainer, and researcher for Impact Online (www.impactonline.com), an independent courseware development company. He provides IT instruction across the globe for various public and private organizations.