Appendix C. Memory Tables

Chapter 3

Table 3-2 Server-Based vs. Agent-Based Scanning

Images

Chapter 8

Table 8-2 Advantages and Disadvantages of SSL/TLS

Images

Table 8-3 Examples of Logging Configuration Settings

Images

Table 8-4 Symmetric Algorithm Strengths and Weaknesses

Images

Table 8-5 Symmetric Algorithms Key Facts

Images

Table 8-6 Asymmetric Algorithm Strengths and Weaknesses

Images

Table 8-7 Applying Cryptography

Images

Chapter 9

Table 9-2 Comparing Black-Box, Gray-Box, and White-Box Testing

Images

Table 9-3 Authentication Protocols

Images

Table 9-4 RADIUS and TACACs+

Images

Chapter 11

Table 11-3 SFC Switches

Images

Chapter 12

Table 12-2 Advantages and Disadvantages of NGFWs

Images

Table 12-3 Pros and Cons of Firewall Types

Images

Table 12-4 RADIUS vs. TACACS+

Images

Chapter 15

Table 15-2 Control Objectives of PCI DSS

Images

Chapter 21

Table 21-3 SABSA Framework Matrix

Images

Table 21-8 SOC Report Comparison Chart

Images
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.112.90