(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide. Mike Chapple
Чтение книги онлайн.
Читать онлайн книгу (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide - Mike Chapple страница 6
15 Chapter 16FIGURE 16.1 Cloud shared responsibility modelFIGURE 16.2 Creating and deploying imagesFIGURE 16.3 Web server and database server
16 Chapter 17FIGURE 17.1 Incident managementFIGURE 17.2 SYN flood attackFIGURE 17.3 A man-in-the-middle attackFIGURE 17.4 Intrusion prevention systemFIGURE 17.5 Viewing a log entry
17 Chapter 18FIGURE 18.1 Seismic hazard mapFIGURE 18.2 Flood hazard map for Miami–Dade County, FloridaFIGURE 18.3 Failover cluster with network load balancing
18 Chapter 20FIGURE 20.1 RStudio Desktop IDEFIGURE 20.2 Security vs. user-friendliness vs. functionalityFIGURE 20.3 The iterative lifecycle model with feedback loopFIGURE 20.4 The spiral lifecycle modeFIGURE 20.5 Software Assurance Maturity ModelFIGURE 20.6 The IDEAL modelFIGURE 20.7 Gantt chartFIGURE 20.8 The DevOps modelFIGURE 20.9 Hierarchical data modelFIGURE 20.10 Customers table from a relational databaseFIGURE 20.11 ODBC as the interface between applications and a back-end datab...
19 Chapter 21FIGURE 21.1 Account number input pageFIGURE 21.2 Account information pageFIGURE 21.3 Account information page after blind SQL injectionFIGURE 21.4 Account creation pageFIGURE 21.5 Example web server directory structureFIGURE 21.6 Message board post rendered in a browserFIGURE 21.7 XSS attack rendered in a browserFIGURE 21.8 Web application firewallFIGURE 21.9 SQL error disclosure
Guide
1 Cover
Pages
1 iii
2 iv
3 v
4 vii
5 ix
6 xi
7 xxxv
8 xxxvii
9 xxxviii
10 xxxix
11 xl
12 xli
13 xlii
14 xliii
15 xliv
16 xlv
17 xlvi
18 xlvii
19 xlviii
20 xlix
21 l
22 li
23 lii
24 liii
25 liv
26 lv
27 lvi
28 lvii
29 lviii
30 lix
31 lx
32 lxi
33 lxii
34 lxiii
35 lxiv
36 lxv
37 lxvi
38 lxvii
39 lxviii
40 lxix
41 lxx
42 lxxi
43 lxxii
44 lxxiii
45 lxxiv
46 1
47 2
48 3
49 4
50 5
51 6
52 7
53 8
54 9