O'Reilly logo

CISSP Study Guide, 3rd Edition by Joshua Feldman, Seth Misenar, Eric Conrad

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Number and Symbol
2TDES EDE, 165
3TDES EDE, 165
4GL (fourth-generation programming languages), 433
802, 1X, 146, 278–280
802, 11A, 260
802, 11Ac, 260
802, 11B, 260
802, 11G, 260
802, 11I, 259, 262
802, 11N, 260
802, 11-1997, 260
9 Step process, risk analysis, 67–68
A
ABM (Asynchronous Balanced Mode), HDLC, 256
Abstraction, secure design concepts, 117
Academy Award watermarks, 183
Acceptance of risk, 65
Acceptance testing, software, 337, 467–468
Accepted practices, customary law, 21
Access aggregation, 311–312
Access audits, 311–312
Access control, 55–58, 293–327
account lockouts, 296
administrative security, 348–352
architecture, 128–131
authentication methods, 294–309
Bell-LaPadula model, 106
Biba model, 107–108
biometrics, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required