In Memory of Shon Harris |
|
xxv | |
Foreword |
|
xxvii | |
From the Author |
|
xxix | |
Acknowledgments |
|
xxx | |
Why Become a CISSP? |
|
xxxi | |
Chapter 1 Security and Risk Management |
|
1 | (192) |
|
Fundamental Principles of Security |
|
|
3 | (3) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (2) |
|
|
8 | (5) |
|
|
13 | (32) |
|
|
16 | (2) |
|
Enterprise Architecture Development |
|
|
18 | (14) |
|
Security Controls Development |
|
|
32 | (5) |
|
Process Management Development |
|
|
37 | (7) |
|
Functionality vs. Security |
|
|
44 | (1) |
|
The Crux of Computer Crime Laws |
|
|
45 | (2) |
|
Complexities in Cybercrime |
|
|
47 | (15) |
|
|
49 | (1) |
|
|
49 | (4) |
|
|
53 | (5) |
|
|
58 | (4) |
|
Intellectual Property Laws |
|
|
62 | (8) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (2) |
|
Internal Protection of Intellectual Property |
|
|
67 | (1) |
|
|
67 | (3) |
|
|
70 | (13) |
|
The Increasing Need for Privacy Laws |
|
|
72 | (1) |
|
Laws, Directives, and Regulations |
|
|
73 | (8) |
|
|
81 | (2) |
|
|
83 | (2) |
|
U.S. Laws Pertaining to Data Breaches |
|
|
84 | (1) |
|
Other Nations' Laws Pertaining to Data Breaches |
|
|
85 | (1) |
|
Policies, Standards, Baselines, Guidelines, and Procedures |
|
|
85 | (8) |
|
|
86 | (3) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (4) |
|
|
94 | (1) |
|
Information Systems Risk Management Policy |
|
|
95 | (1) |
|
|
95 | (1) |
|
The Risk Management Process |
|
|
96 | (1) |
|
|
97 | (4) |
|
|
97 | (2) |
|
Threat Modeling Methodologies |
|
|
99 | (2) |
|
Risk Assessment and Analysis |
|
|
101 | (24) |
|
|
103 | (1) |
|
The Value of Information and Assets |
|
|
104 | (1) |
|
Costs That Make Up the Value |
|
|
104 | (1) |
|
Identifying Vulnerabilities and Threats |
|
|
105 | (1) |
|
Methodologies for Risk Assessment |
|
|
106 | (6) |
|
|
112 | (3) |
|
Qualitative Risk Analysis |
|
|
115 | (4) |
|
|
119 | (3) |
|
Total Risk vs. Residual Risk |
|
|
122 | (2) |
|
|
124 | (1) |
|
Supply Chain Risk Management |
|
|
125 | (3) |
|
Upstream and Downstream Suppliers |
|
|
127 | (1) |
|
|
128 | (1) |
|
Risk Management Frameworks |
|
|
128 | (4) |
|
Categorize Information System |
|
|
130 | (1) |
|
|
130 | (1) |
|
Implement Security Controls |
|
|
131 | (1) |
|
|
131 | (1) |
|
Authorize Information System |
|
|
132 | (1) |
|
Monitor Security Controls |
|
|
132 | (1) |
|
Business Continuity and Disaster Recovery |
|
|
132 | (24) |
|
Standards and Best Practices |
|
|
135 | (3) |
|
Making BCM Part of the Enterprise Security Program |
|
|
138 | (3) |
|
|
141 | (15) |
|
|
156 | (4) |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
159 | (1) |
|
Security Awareness Training |
|
|
160 | (3) |
|
|
162 | (1) |
|
|
163 | (9) |
|
|
165 | (4) |
|
|
169 | (1) |
|
The Computer Ethics Institute |
|
|
170 | (1) |
|
The Internet Architecture Board |
|
|
170 | (2) |
|
Corporate Ethics Programs |
|
|
172 | (1) |
|
|
172 | (2) |
|
|
174 | (19) |
|
|
179 | (9) |
|
|
188 | (5) |
Chapter 2 Asset Security |
|
193 | (58) |
|
|
194 | (3) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (6) |
|
|
198 | (3) |
|
|
201 | (2) |
|
|
203 | (7) |
|
|
204 | (3) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
210 | (4) |
|
Developing a Retention Policy |
|
|
211 | (3) |
|
|
214 | (5) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (3) |
|
|
218 | (1) |
|
|
219 | (12) |
|
|
219 | (4) |
|
|
223 | (6) |
|
Protecting Mobile Devices |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (10) |
|
|
232 | (9) |
|
|
241 | (1) |
|
|
241 | (10) |
|
|
243 | (4) |
|
|
247 | (4) |
Chapter 3 Security Architecture and Engineering |
|
251 | (230) |
|
|
252 | (4) |
|
|
256 | (18) |
|
The Central Processing Unit |
|
|
256 | (5) |
|
|
261 | (1) |
|
|
261 | (13) |
|
|
274 | (31) |
|
|
274 | (10) |
|
|
284 | (5) |
|
Input/Output Device Management |
|
|
289 | (2) |
|
CPU Architecture Integration |
|
|
291 | (4) |
|
Operating System Architectures |
|
|
295 | (7) |
|
|
302 | (3) |
|
System Security Architecture |
|
|
305 | (7) |
|
|
306 | (1) |
|
Security Architecture Requirements |
|
|
307 | (5) |
|
|
312 | (6) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
Harrison-Ruzzo-Ullman Model |
|
|
317 | (1) |
|
|
318 | (5) |
|
|
319 | (3) |
|
Why Put a Product Through Evaluation? |
|
|
322 | (1) |
|
Certification vs. Accreditation |
|
|
323 | (2) |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (12) |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (3) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (4) |
|
|
338 | (3) |
|
|
338 | (1) |
|
Time-of-Check/Time-of-Use Attacks |
|
|
339 | (2) |
|
|
341 | (5) |
|
The History of Cryptography |
|
|
341 | (5) |
|
Cryptography Definitions and Concepts |
|
|
346 | (10) |
|
|
349 | (1) |
|
The Strength of the Cryptosystem |
|
|
349 | (1) |
|
|
350 | (2) |
|
Running and Concealment Ciphers |
|
|
352 | (1) |
|
|
353 | (3) |
|
|
356 | (2) |
|
|
356 | (1) |
|
|
356 | (2) |
|
|
358 | (16) |
|
Symmetric vs. Asymmetric Algorithms |
|
|
359 | (1) |
|
|
359 | (4) |
|
|
363 | (6) |
|
Hybrid Encryption Methods |
|
|
369 | (5) |
|
Types of Symmetric Systems |
|
|
374 | (11) |
|
|
375 | (7) |
|
|
382 | (1) |
|
Advanced Encryption Standard |
|
|
383 | (1) |
|
International Data Encryption Algorithm |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
Types of Asymmetric Systems |
|
|
385 | (8) |
|
|
385 | (3) |
|
|
388 | (3) |
|
|
391 | (1) |
|
Elliptic Curve Cryptosystems |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
393 | (7) |
|
|
393 | (5) |
|
Various Hashing Algorithms |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
399 | (1) |
|
Attacks Against One-Way Hash Functions |
|
|
399 | (1) |
|
Public Key Infrastructure |
|
|
400 | (6) |
|
|
401 | (2) |
|
|
403 | (1) |
|
The Registration Authority |
|
|
403 | (1) |
|
|
404 | (2) |
|
|
406 | (9) |
|
Services of Cryptosystems |
|
|
406 | (1) |
|
|
407 | (2) |
|
Digital Signature Standard |
|
|
409 | (1) |
|
|
410 | (2) |
|
|
412 | (2) |
|
Digital Rights Management |
|
|
414 | (1) |
|
|
415 | (5) |
|
|
415 | (1) |
|
|
416 | (1) |
|
|
416 | (1) |
|
Chosen-Ciphertext Attacks |
|
|
416 | (1) |
|
Differential Cryptanalysis |
|
|
417 | (1) |
|
|
417 | (1) |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
419 | (1) |
|
|
419 | (1) |
|
Social Engineering Attacks |
|
|
419 | (1) |
|
Meet-in-the-Middle Attacks |
|
|
419 | (1) |
|
Site and Facility Security |
|
|
420 | (1) |
|
The Site Planning Process |
|
|
421 | (24) |
|
Crime Prevention Through Environmental Design |
|
|
426 | (6) |
|
Designing a Physical Security Program |
|
|
432 | (13) |
|
|
445 | (15) |
|
|
446 | (5) |
|
|
451 | (2) |
|
Fire Prevention, Detection, and Suppression |
|
|
453 | (7) |
|
|
460 | (1) |
|
|
460 | (21) |
|
|
466 | (10) |
|
|
476 | (5) |
Chapter 4 Communication and Network Security |
|
481 | (248) |
|
Principles of Network Architectures |
|
|
482 | (1) |
|
Open Systems Interconnection Reference Model |
|
|
483 | (18) |
|
|
484 | (3) |
|
|
487 | (1) |
|
|
488 | (1) |
|
|
489 | (2) |
|
|
491 | (2) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
495 | (1) |
|
Functions and Protocols in the OSI Model |
|
|
496 | (2) |
|
Tying the Layers Together |
|
|
498 | (1) |
|
|
499 | (2) |
|
|
501 | (15) |
|
|
502 | (5) |
|
|
507 | (3) |
|
|
510 | (3) |
|
Layer 2 Security Standards |
|
|
513 | (2) |
|
|
515 | (1) |
|
|
516 | (11) |
|
|
516 | (6) |
|
|
522 | (5) |
|
|
527 | (24) |
|
Wireless Communications Techniques |
|
|
528 | (3) |
|
|
531 | (1) |
|
Evolution of WLAN Security |
|
|
532 | (7) |
|
|
539 | (5) |
|
Best Practices for Securing WLANs |
|
|
544 | (1) |
|
|
544 | (1) |
|
Mobile Wireless Communication |
|
|
545 | (6) |
|
|
551 | (16) |
|
|
552 | (2) |
|
Media Access Technologies |
|
|
554 | (12) |
|
|
566 | (1) |
|
Network Protocols and Services |
|
|
567 | (29) |
|
Address Resolution Protocol |
|
|
567 | (2) |
|
Dynamic Host Configuration Protocol |
|
|
569 | (3) |
|
Internet Control Message Protocol |
|
|
572 | (2) |
|
Simple Network Management Protocol |
|
|
574 | (2) |
|
|
576 | (7) |
|
|
583 | (6) |
|
Network Address Translation |
|
|
589 | (2) |
|
|
591 | (5) |
|
|
596 | (49) |
|
|
596 | (1) |
|
|
597 | (2) |
|
|
599 | (2) |
|
|
601 | (4) |
|
|
605 | (2) |
|
|
607 | (4) |
|
|
611 | (24) |
|
|
635 | (2) |
|
Unified Threat Management |
|
|
637 | (1) |
|
Content Distribution Networks |
|
|
638 | (1) |
|
Software Defined Networking |
|
|
639 | (2) |
|
|
641 | (1) |
|
|
642 | (1) |
|
|
643 | (1) |
|
|
644 | (1) |
|
|
645 | (2) |
|
Metropolitan Area Networks |
|
|
647 | (3) |
|
|
649 | (1) |
|
|
650 | (18) |
|
Telecommunications Evolution |
|
|
650 | (2) |
|
|
652 | (4) |
|
|
656 | (12) |
|
|
668 | (1) |
|
Multiservice Access Technologies |
|
|
668 | (9) |
|
|
670 | (1) |
|
|
671 | (4) |
|
|
675 | (2) |
|
|
677 | (15) |
|
|
677 | (1) |
|
|
678 | (2) |
|
|
680 | (1) |
|
|
681 | (1) |
|
|
682 | (8) |
|
|
690 | (2) |
|
|
692 | (11) |
|
Link Encryption vs. End-to-End Encryption |
|
|
692 | (3) |
|
E-mail Encryption Standards |
|
|
695 | (2) |
|
|
697 | (6) |
|
|
703 | (5) |
|
|
703 | (3) |
|
|
706 | (1) |
|
|
706 | (1) |
|
|
707 | (1) |
|
|
708 | (1) |
|
|
708 | (21) |
|
|
713 | (9) |
|
|
722 | (7) |
Chapter 5 Identity and Access Management |
|
729 | (134) |
|
|
729 | (2) |
|
|
731 | (1) |
|
|
731 | (1) |
|
|
731 | (1) |
|
|
732 | (1) |
|
Identification, Authentication, |
|
|
|
Authorization, and Accountability |
|
|
732 | (2) |
|
Identification and Authentication |
|
|
734 | (11) |
|
|
745 | (21) |
|
|
766 | (13) |
|
|
779 | (5) |
|
|
784 | (1) |
|
|
785 | (11) |
|
Integrating Identity as a Service |
|
|
796 | (2) |
|
|
796 | (1) |
|
|
796 | (1) |
|
|
797 | (1) |
|
Access Control Mechanisms |
|
|
798 | (9) |
|
Discretionary Access Control |
|
|
798 | (2) |
|
|
800 | (2) |
|
Role-Based Access Control |
|
|
802 | (3) |
|
Rule-Based Access Control |
|
|
805 | (1) |
|
Attribute-Based Access Control |
|
|
806 | (1) |
|
Access Control Techniques and Technologies |
|
|
807 | (10) |
|
Constrained User Interfaces |
|
|
807 | (1) |
|
Remote Access Control Technologies |
|
|
808 | (6) |
|
|
814 | (1) |
|
Content-Dependent Access Control |
|
|
815 | (1) |
|
Context-Dependent Access Control |
|
|
816 | (1) |
|
Managing the Identity and Access |
|
|
|
|
817 | (1) |
|
|
817 | (1) |
|
|
817 | (1) |
|
System Account Access Review |
|
|
818 | (1) |
|
|
818 | (1) |
|
Controlling Physical and Logical Access |
|
|
819 | (6) |
|
|
819 | (1) |
|
|
820 | (1) |
|
|
821 | (1) |
|
|
822 | (3) |
|
|
825 | (3) |
|
Unauthorized Disclosure of Information |
|
|
826 | (2) |
|
Access Control Monitoring |
|
|
828 | (12) |
|
Intrusion Detection Systems |
|
|
828 | (9) |
|
Intrusion Prevention Systems |
|
|
837 | (3) |
|
Threats to Access Control |
|
|
840 | (6) |
|
|
841 | (1) |
|
|
842 | (1) |
|
|
842 | (1) |
|
|
843 | (3) |
|
|
846 | (1) |
|
|
846 | (17) |
|
|
850 | (9) |
|
|
859 | (4) |
Chapter 6 Security Assessment and Testing |
|
863 | (62) |
|
Assessment, Test, and Audit Strategies |
|
|
864 | (7) |
|
|
866 | (2) |
|
|
868 | (1) |
|
|
869 | (1) |
|
|
870 | (1) |
|
Auditing Technical Controls |
|
|
871 | (20) |
|
|
871 | (2) |
|
|
873 | (5) |
|
|
878 | (1) |
|
Other Vulnerability Types |
|
|
879 | (2) |
|
|
881 | (2) |
|
|
883 | (3) |
|
|
886 | (1) |
|
|
887 | (1) |
|
|
888 | (2) |
|
|
890 | (1) |
|
|
890 | (1) |
|
Auditing Administrative Controls |
|
|
891 | (18) |
|
|
891 | (3) |
|
|
894 | (3) |
|
Disaster Recovery and Business Continuity |
|
|
897 | (5) |
|
Security Training and Security Awareness Training |
|
|
902 | (5) |
|
Key Performance and Risk Indicators |
|
|
907 | (2) |
|
|
909 | (4) |
|
|
910 | (1) |
|
Writing Technical Reports |
|
|
911 | (1) |
|
|
912 | (1) |
|
Management Review and Approval |
|
|
913 | (3) |
|
Before the Management Review |
|
|
914 | (1) |
|
|
914 | (1) |
|
|
915 | (1) |
|
|
916 | (1) |
|
|
916 | (9) |
|
|
918 | (4) |
|
|
922 | (3) |
Chapter 7 Security Operations |
|
925 | (158) |
|
The Role of the Operations Department |
|
|
926 | (1) |
|
Administrative Management |
|
|
927 | (5) |
|
Security and Network Personnel |
|
|
929 | (2) |
|
|
931 | (1) |
|
|
932 | (1) |
|
|
932 | (23) |
|
|
933 | (7) |
|
Personnel Access Controls |
|
|
940 | (1) |
|
External Boundary Protection Mechanisms |
|
|
941 | (10) |
|
Intrusion Detection Systems |
|
|
951 | (2) |
|
|
953 | (1) |
|
|
954 | (1) |
|
|
954 | (1) |
|
Internal Security Controls |
|
|
955 | (1) |
|
Secure Resource Provisioning |
|
|
955 | (17) |
|
|
956 | (1) |
|
|
957 | (3) |
|
|
960 | (4) |
|
|
964 | (2) |
|
Input and Output Controls |
|
|
966 | (1) |
|
|
967 | (3) |
|
|
970 | (1) |
|
Provisioning Cloud Assets |
|
|
971 | (1) |
|
Network and Resource Availability |
|
|
972 | (13) |
|
Mean Time Between Failures |
|
|
973 | (1) |
|
|
973 | (1) |
|
|
974 | (8) |
|
|
982 | (2) |
|
|
984 | (1) |
|
|
985 | (15) |
|
|
986 | (1) |
|
|
987 | (1) |
|
Intrusion Detection and Prevention Systems |
|
|
988 | (1) |
|
Whitelisting and Blacklisting |
|
|
989 | (1) |
|
|
990 | (1) |
|
|
990 | (3) |
|
|
993 | (3) |
|
|
996 | (1) |
|
|
997 | (1) |
|
|
998 | (1) |
|
Security Information and Event Management |
|
|
998 | (1) |
|
|
999 | (1) |
|
The Incident Management Process |
|
|
1000 | (9) |
|
|
1005 | (1) |
|
|
1005 | (1) |
|
|
1006 | (1) |
|
|
1007 | (1) |
|
|
1008 | (1) |
|
|
1008 | (1) |
|
|
1009 | (16) |
|
Computer Forensics and Proper Collection of Evidence |
|
|
1010 | (2) |
|
Motive, Opportunity, and Means |
|
|
1012 | (1) |
|
Computer Criminal Behavior |
|
|
1012 | (1) |
|
|
1013 | (1) |
|
|
1014 | (1) |
|
The Forensic Investigation Process |
|
|
1015 | (6) |
|
What Is Admissible in Court? |
|
|
1021 | (2) |
|
Surveillance, Search, and Seizure |
|
|
1023 | (2) |
|
|
1025 | (28) |
|
Business Process Recovery |
|
|
1028 | (1) |
|
|
1029 | (7) |
|
Supply and Technology Recovery |
|
|
1036 | (4) |
|
Backup Storage Strategies |
|
|
1040 | (10) |
|
|
1050 | (1) |
|
|
1051 | (2) |
|
Liability and Its Ramifications |
|
|
1053 | (7) |
|
|
1056 | (2) |
|
|
1058 | (1) |
|
|
1059 | (1) |
|
Procurement and Vendor Processes |
|
|
1059 | (1) |
|
|
1060 | (1) |
|
Implementing Disaster Recovery |
|
|
1061 | (6) |
|
|
1062 | (1) |
|
|
1063 | (1) |
|
|
1064 | (2) |
|
|
1066 | (1) |
|
|
1067 | (1) |
|
|
1067 | (3) |
|
|
1068 | (1) |
|
|
1068 | (1) |
|
|
1069 | (1) |
|
|
1070 | (1) |
|
|
1070 | (1) |
|
|
1070 | (13) |
|
|
1073 | (6) |
|
|
1079 | (4) |
Chapter 8 Software Development Security |
|
1083 | (134) |
|
|
1083 | (6) |
|
Where Do We Place Security? |
|
|
1084 | (2) |
|
Different Environments Demand Different Security |
|
|
1086 | (1) |
|
Environment vs. Application |
|
|
1087 | (1) |
|
Functionality vs. Security |
|
|
1087 | (1) |
|
Implementation and Default Issues |
|
|
1088 | (1) |
|
Software Development Life Cycle |
|
|
1089 | (13) |
|
|
1090 | (1) |
|
Requirements Gathering Phase |
|
|
1091 | (1) |
|
|
1092 | (3) |
|
|
1095 | (3) |
|
|
1098 | (2) |
|
Operations and Maintenance Phase |
|
|
1100 | (2) |
|
Software Development Methodologies |
|
|
1102 | (12) |
|
|
1103 | (1) |
|
|
1103 | (1) |
|
|
1104 | (1) |
|
|
1105 | (1) |
|
|
1106 | (1) |
|
Rapid Application Development |
|
|
1107 | (1) |
|
|
1108 | (4) |
|
|
1112 | (1) |
|
|
1112 | (2) |
|
Capability Maturity Model Integration |
|
|
1114 | (2) |
|
|
1116 | (2) |
|
|
1117 | (1) |
|
Security of Development Environments |
|
|
1118 | (3) |
|
Security of Development Platforms |
|
|
1118 | (1) |
|
Security of Code Repositories |
|
|
1119 | (1) |
|
Software Configuration Management |
|
|
1120 | (1) |
|
|
1121 | (2) |
|
Source Code Vulnerabilities |
|
|
1121 | (1) |
|
|
1122 | (1) |
|
Programming Languages and Concepts |
|
|
1123 | (15) |
|
Assemblers, Compilers, Interpreters |
|
|
1126 | (2) |
|
|
1128 | (7) |
|
Other Software Development Concepts |
|
|
1135 | (2) |
|
Application Programming Interfaces |
|
|
1137 | (1) |
|
|
1138 | (10) |
|
Distributed Computing Environment |
|
|
1138 | (1) |
|
|
1139 | (2) |
|
|
1141 | (3) |
|
Java Platform, Enterprise Edition |
|
|
1144 | (1) |
|
Service-Oriented Architecture |
|
|
1144 | (4) |
|
|
1148 | (3) |
|
|
1148 | (2) |
|
|
1150 | (1) |
|
|
1151 | (9) |
|
Specific Threats for Web Environments |
|
|
1152 | (7) |
|
Web Application Security Principles |
|
|
1159 | (1) |
|
|
1160 | (22) |
|
Database Management Software |
|
|
1160 | (2) |
|
|
1162 | (5) |
|
Database Programming Interfaces |
|
|
1167 | (2) |
|
Relational Database Components |
|
|
1169 | (2) |
|
|
1171 | (3) |
|
|
1174 | (5) |
|
Data Warehousing and Data Mining |
|
|
1179 | (3) |
|
Malicious Software (Malware) |
|
|
1182 | (15) |
|
|
1184 | (2) |
|
|
1186 | (1) |
|
|
1187 | (1) |
|
|
1188 | (1) |
|
|
1188 | (1) |
|
|
1189 | (1) |
|
|
1190 | (1) |
|
|
1191 | (3) |
|
|
1194 | (2) |
|
|
1196 | (1) |
|
Assessing the Security of Acquired Software |
|
|
1197 | (1) |
|
|
1198 | (1) |
|
|
1198 | (19) |
|
|
1203 | (7) |
|
|
1210 | (7) |
Appendix A Comprehensive Questions |
|
1217 | (56) |
|
|
1253 | (20) |
Appendix B About the Online Content |
|
1273 | (6) |
|
|
1273 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
1273 | (2) |
|
Single User License Terms and Conditions |
|
|
1273 | (2) |
|
|
1275 | (1) |
|
Hotspot and Drag-and-Drop Questions |
|
|
1275 | (1) |
|
|
1276 | (1) |
|
Single User License Terms and Conditions |
|
|
1276 | (1) |
|
|
1277 | (2) |
Glossary |
|
1279 | (18) |
Index |
|
1297 | |