(ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide Mike Chapple Download
(ISC) 2 CISSP Certified Information Systems Security Professional Official Study Guide Mike Chapple Download
https://ebookmass.com/product/isc2-cissp-certified-information-systems-
security-professional-official-study-guide-mike-chapple/
https://ebookmass.com/product/official-google-cloud-certified-
professional-machine-learning-engineer-study-guide-mona/
https://ebookmass.com/product/official-google-cloud-certified-
professional-data-engineer-study-guide-1st-edition-dan-sullivan/
https://ebookmass.com/product/ccsp-certified-cloud-security-
professional-exam-guide-3rd-edition-unknown/
https://ebookmass.com/product/ccsp-certified-cloud-security-
professional-all-in-one-exam-guide-daniel-carter/
https://ebookmass.com/product/ccsp-certified-cloud-security-
professional-all-in-one-exam-guide-3rd-edition-daniel-carter/
https://ebookmass.com/product/comptia-security-get-certified-get-
ahead-sy0-501-study-guide-ebook-pdf/
https://ebookmass.com/product/fundamentals-of-information-systems-
security/
Table of Contents
Cover
Title Page
Copyright
Dedication
Acknowledgments
About the Authors
About the Technical Editors
Foreword
Introduction
Overview of the CISSP Exam
The Elements of This Study Guide
Interactive Online Learning Environment and TestBank
Study Guide Exam Objectives
Objective Map
Reader Support for This Book
Assessment Test
Answers to Assessment Test
Chapter 1: Security Governance Through Principles and Policies
Security 101
Understand and Apply Security Concepts
Security Boundaries
Evaluate and Apply Security Governance Principles
Manage the Security Function
Security Policy, Standards, Procedures, and Guidelines
Threat Modeling
Supply Chain Risk Management
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 2: Personnel Security and Risk Management Concepts
Personnel Security Policies and Procedures
Understand and Apply Risk Management Concepts
Social Engineering
Establish and Maintain a Security Awareness, Education, and
Training Program
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 3: Business Continuity Planning
Planning for Business Continuity
Project Scope and Planning
Business Impact Analysis
Continuity Planning
Plan Approval and Implementation
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 4: Laws, Regulations, and Compliance
Categories of Laws
Laws
State Privacy Laws
Compliance
Contracting and Procurement
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 5: Protecting Security of Assets
Identifying and Classifying Information and Assets
Establishing Information and Asset Handling Requirements
Data Protection Methods
Understanding Data Roles
Using Security Baselines
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 6: Cryptography and Symmetric Key Algorithms
Cryptographic Foundations
Modern Cryptography
Symmetric Cryptography
Cryptographic Lifecycle
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 7: PKI and Cryptographic Applications
Asymmetric Cryptography
Hash Functions
Digital Signatures
Public Key Infrastructure
Asymmetric Key Management
Hybrid Cryptography
Applied Cryptography
Cryptographic Attacks
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 8: Principles of Security Models, Design, and Capabilities
Secure Design Principles
Techniques for Ensuring CIA
Understand the Fundamental Concepts of Security Models
Select Controls Based on Systems Security Requirements
Understand Security Capabilities of Information Systems
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 9: Security Vulnerabilities, Threats, and Countermeasures
Shared Responsibility
Assess and Mitigate the Vulnerabilities of Security
Architectures, Designs, and Solution Elements
Client-Based Systems
Server-Based Systems
Industrial Control Systems
Distributed Systems
High-Performance Computing (HPC) Systems
Internet of Things
Edge and Fog Computing
Embedded Devices and Cyber-Physical Systems
Specialized Devices
Microservices
Infrastructure as Code
Virtualized Systems
Containerization
Serverless Architecture
Mobile Devices
Essential Security Protection Mechanisms
Common Security Architecture Flaws and Issues
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 10: Physical Security Requirements
Apply Security Principles to Site and Facility Design
Implement Site and Facility Security Controls
Implement and Manage Physical Security
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 11: Secure Network Architecture and Components
OSI Model
TCP/IP Model
Analyzing Network Traffic
Common Application Layer Protocols
Transport Layer Protocols
Domain Name System
Internet Protocol (IP) Networking
ARP Concerns
Secure Communication Protocols
Implications of Multilayer Protocols
Microsegmentation
Wireless Networks
Other Communication Protocols
Cellular Networks
Content Distribution Networks (CDNs)
Secure Network Components
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 12: Secure Communications and Network Attacks
Protocol Security Mechanisms
Secure Voice Communications
Remote Access Security Management
Multimedia Collaboration
Load Balancing
Manage Email Security
Virtual Private Network
Switching and Virtual LANs
Network Address Translation
Third-Party Connectivity
Switching Technologies
WAN Technologies
Fiber-Optic Links
Security Control Characteristics
Prevent or Mitigate Network Attacks
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 13: Managing Identity and Authentication
Controlling Access to Assets
Managing Identification and Authentication
Implementing Identity Management
Managing the Identity and Access Provisioning Lifecycle
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 14: Controlling and Monitoring Access
Comparing Access Control Models
Implementing Authentication Systems
Understanding Access Control Attacks
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 15: Security Assessment and Testing
Building a Security Assessment and Testing Program
Performing Vulnerability Assessments
Testing Your Software
Implementing Security Management Processes
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 16: Managing Security Operations
Apply Foundational Security Operations Concepts
Addressing Personnel Safety and Security
Provision Resources Securely
Apply Resource Protection
Managed Services in the Cloud
Perform Configuration Management (CM)
Managing Change
Managing Patches and Reducing Vulnerabilities
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 17: Preventing and Responding to Incidents
Conducting Incident Management
Implementing Detective and Preventive Measures
Logging and Monitoring
Automating Incident Response
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 18: Disaster Recovery Planning
The Nature of Disaster
Understand System Resilience, High Availability, and Fault
Tolerance
Recovery Strategy
Recovery Plan Development
Training, Awareness, and Documentation
Testing and Maintenance
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 19: Investigations and Ethics
Investigations
Major Categories of Computer Crime
Ethics
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 20: Software Development Security
Introducing Systems Development Controls
Establishing Databases and Data Warehousing
Storage Threats
Understanding Knowledge-Based Systems
Summary
Exam Essentials
Written Lab
Review Questions
Chapter 21: Malicious Code and Application Attacks
Malware
Malware Prevention
Application Attacks
Injection Vulnerabilities
Exploiting Authorization Vulnerabilities
Exploiting Web Application Vulnerabilities
Application Security Controls
Secure Coding Practices
Summary
Exam Essentials
Written Lab
Review Questions
Appendix A: Answers to Review Questions
Chapter 1: Security Governance Through Principles and Policies
Chapter 2: Personnel Security and Risk Management Concepts
Chapter 3: Business Continuity Planning
Chapter 4: Laws, Regulations, and Compliance
Visit https://ebookmass.com today to explore
a vast collection of ebooks across various
genres, available in popular formats like
PDF, EPUB, and MOBI, fully compatible with
all devices. Enjoy a seamless reading
experience and effortlessly download high-
quality materials in just a few simple steps.
Plus, don’t miss out on exciting offers that
let you access a wealth of knowledge at the
best prices!
Chapter 5: Protecting Security of Assets
Chapter 6: Cryptography and Symmetric Key Algorithms
Chapter 7: PKI and Cryptographic Applications
Chapter 8: Principles of Security Models, Design, and
Capabilities
Chapter 9: Security Vulnerabilities, Threats, and
Countermeasures
Chapter 10: Physical Security Requirements
Chapter 11: Secure Network Architecture and Components
Chapter 12: Secure Communications and Network Attacks
Chapter 13: Managing Identity and Authentication
Chapter 14: Controlling and Monitoring Access
Chapter 15: Security Assessment and Testing
Chapter 16: Managing Security Operations
Chapter 17: Preventing and Responding to Incidents
Chapter 18: Disaster Recovery Planning
Chapter 19: Investigations and Ethics
Chapter 20: Software Development Security
Chapter 21: Malicious Code and Application Attacks
Appendix B: Answers to Written Labs
Chapter 1: Security Governance Through Principles and Policies
Chapter 2: Personnel Security and Risk Management Concepts
Chapter 3: Business Continuity Planning
Chapter 4: Laws, Regulations, and Compliance
Chapter 5: Protecting Security of Assets
Chapter 6: Cryptography and Symmetric Key Algorithms
Chapter 7: PKI and Cryptographic Applications
Chapter 8: Principles of Security Models, Design, and
Capabilities
Chapter 9: Security Vulnerabilities, Threats, and
Countermeasures
Chapter 10: Physical Security Requirements
Chapter 11: Secure Network Architecture and Components
Chapter 12: Secure Communications and Network Attacks
Chapter 13: Managing Identity and Authentication
Chapter 14: Controlling and Monitoring Access
Chapter 15: Security Assessment and Testing
Chapter 16: Managing Security Operations
Chapter 17: Preventing and Responding to Incidents
Chapter 18: Disaster Recovery Planning
Chapter 19: Investigations and Ethics
Chapter 20: Software Development Security
Chapter 21: Malicious Code and Application Attacks
Index
End User License Agreement
List of Tables
Chapter 2
TABLE 2.1 Comparison of quantitative and qualitative risk
analysis
TABLE 2.2 Quantitative risk analysis formulas
Chapter 5
TABLE 5.1 Securing email data
TABLE 5.2 Unmodified data within a database
TABLE 5.3 Masked data
Chapter 6
TABLE 6.1 AND operation truth table
TABLE 6.2 OR operation truth table
TABLE 6.3 NOT operation truth table
TABLE 6.4 Exclusive OR operation truth table
TABLE 6.5 Using the Vigenère system
TABLE 6.6 The encryption operation
TABLE 6.7 Symmetric and asymmetric key comparison
TABLE 6.8 Comparison of symmetric and asymmetric
cryptography systems
TABLE 6.9 Symmetric encryption memorization chart
Chapter 7
TABLE 7.1 Hash algorithm memorization chart
TABLE 7.2 Digital certificate formats
Chapter 8
TABLE 8.1 Subjects and objects
TABLE 8.2 Fail terms definitions related to physical and digital
products
TABLE 8.3 An access control matrix
TABLE 8.4 Common Criteria evaluation assurance levels
Chapter 10
TABLE 10.1 Static voltage and damage
TABLE 10.2 Fire extinguisher classes
Chapter 11
TABLE 11.1 IP classes
TABLE 11.2 IP classes' default subnet masks
TABLE 11.3 802.11 wireless networking amendments
TABLE 11.4 UTP categories
Chapter 12
TABLE 12.1 Common load-balancing scheduling techniques
TABLE 12.2 Circuit switching vs. packet switching
TABLE 12.3 Bandwidth levels of SDH and SONET
List of Illustrations
Chapter 1
FIGURE 1.1 The CIA Triad
FIGURE 1.2 The five elements of AAA services
FIGURE 1.3 Strategic, tactical, and operational plan timeline
comparison
FIGURE 1.4 An example of diagramming to reveal threat
concerns
FIGURE 1.5 A risk matrix or risk heat map
Chapter 2
FIGURE 2.1 Ex-employees must return all company property.
FIGURE 2.2 The cyclical relationships of risk elements
FIGURE 2.3 The six major elements of quantitative risk analysis
FIGURE 2.4 The categories of security controls in a defense-in-
depth impleme...
FIGURE 2.5 The elements of the risk management framework
(RMF) (from NIST SP...
Chapter 3
FIGURE 3.1 Earthquake hazard map of the United States
Chapter 5
FIGURE 5.1 Data classifications
FIGURE 5.2 Clearing a hard drive
Chapter 6
FIGURE 6.1 Challenge-response authentication protocol
FIGURE 6.2 The magic door
FIGURE 6.3 Symmetric key cryptography
FIGURE 6.4 Asymmetric key cryptography
Chapter 7
FIGURE 7.1 Asymmetric key cryptography
FIGURE 7.2 Steganography tool
FIGURE 7.3 Image with embedded message
Chapter 8
FIGURE 8.1 Transitive trust
FIGURE 8.2 The TCB, security perimeter, and reference
monitor
FIGURE 8.3 The take-grant model's directed graph
FIGURE 8.4 The Bell–LaPadula model
FIGURE 8.5 The Biba model
FIGURE 8.6 Memorizing Bell–LaPadula and Biba
FIGURE 8.7 The Clark–Wilson model
Chapter 9
FIGURE 9.1 The four-layer protection ring model
FIGURE 9.2 The lifecycle of an executed process
FIGURE 9.3 Types of hypervisors
FIGURE 9.4 Application containers versus a hypervisor
Chapter 10
FIGURE 10.1 A smartcard's ISO 7816 interface
FIGURE 10.2 Hot and cold aisles
FIGURE 10.3 The fire triangle
FIGURE 10.4 The four primary stages of fire
FIGURE 10.5 A secure physical boundary with an access control
vestibule and ...
Chapter 11
FIGURE 11.1 The OSI model
FIGURE 11.2 OSI model encapsulation
FIGURE 11.3 The OSI model peer layer logical channels
FIGURE 11.4 OSI model layer-based network container names
FIGURE 11.5 Comparing the OSI model with the TCP/IP model
FIGURE 11.6 The TCP three-way handshake
FIGURE 11.7 An RFID antenna
FIGURE 11.8 The configuration dialog boxes for a transparent
(left) vs. a no...
FIGURE 11.9 A ring topology
FIGURE 11.10 A linear bus topology and a tree bus topology
FIGURE 11.11 A star topology
FIGURE 11.12 A mesh topology
Chapter 12
FIGURE 12.1 IPsec's encryption of a packet in transport mode
FIGURE 12.2 IPsec's encryption of a packet in tunnel mode
FIGURE 12.3 Two LANs being connected using a tunnel-mode
VPN across the inte...
FIGURE 12.4 A client connecting to a network via a remote-
access/tunnel VPN ...
Chapter 13
FIGURE 13.1 Graph of FRR and FAR errors indicating the CER
point
Chapter 14
FIGURE 14.1 Role-Based Access Control
FIGURE 14.2 A representation of the boundaries provided by
lattice-based acc...
FIGURE 14.3 Wireshark capture
Chapter 15
FIGURE 15.1 Nmap scan of a web server run from a Linux
system
FIGURE 15.2 Default Apache server page running on the server
scanned in Figu...
FIGURE 15.3 Nmap scan of a large network run from a Mac
system using the Ter...
FIGURE 15.4 Network vulnerability scan of the same web server
that was port ...
FIGURE 15.5 Web application vulnerability scan of the same
web server that w...
FIGURE 15.6 Scanning a database-backed application with
sqlmap
FIGURE 15.7 Penetration testing process
FIGURE 15.8 The Metasploit Framework automated system
exploitation tool allo...
FIGURE 15.9 Fagan inspections follow a rigid formal process,
with defined en...
FIGURE 15.10 Prefuzzing input file containing a series of 1s
FIGURE 15.11 The input file from Figure 15.10 after being run
through the zz...
Chapter 16
FIGURE 16.1 Cloud shared responsibility model
FIGURE 16.2 Creating and deploying images
FIGURE 16.3 Web server and database server
Chapter 17
FIGURE 17.1 Incident management
FIGURE 17.2 SYN flood attack
FIGURE 17.3 A man-in-the-middle attack
FIGURE 17.4 Intrusion prevention system
FIGURE 17.5 Viewing a log entry
Chapter 18
FIGURE 18.1 Seismic hazard map
FIGURE 18.2 Flood hazard map for Miami–Dade County,
Florida
FIGURE 18.3 Failover cluster with network load balancing
Chapter 20
FIGURE 20.1 RStudio Desktop IDE
FIGURE 20.2 Security vs. user-friendliness vs. functionality
FIGURE 20.3 The iterative lifecycle model with feedback loop
FIGURE 20.4 The spiral lifecycle mode
FIGURE 20.5 Software Assurance Maturity Model
FIGURE 20.6 The IDEAL model
FIGURE 20.7 Gantt chart
FIGURE 20.8 The DevOps model
FIGURE 20.9 Hierarchical data model
FIGURE 20.10 Customers table from a relational database
FIGURE 20.11 ODBC as the interface between applications and
a back-end datab...
Chapter 21
FIGURE 21.1 Account number input page
FIGURE 21.2 Account information page
FIGURE 21.3 Account information page after blind SQL
injection
FIGURE 21.4 Account creation page
FIGURE 21.5 Example web server directory structure
FIGURE 21.6 Message board post rendered in a browser
FIGURE 21.7 XSS attack rendered in a browser
FIGURE 21.8 Web application firewall
FIGURE 21.9 SQL error disclosure
(ISC)2®
CISSP® Certified Information
Systems Security Professional
Official Study Guide
Ninth Edition
Mike Chapple
James Michael Stewart
Darril Gibson
Visit https://ebookmass.com today to explore
a vast collection of ebooks across various
genres, available in popular formats like
PDF, EPUB, and MOBI, fully compatible with
all devices. Enjoy a seamless reading
experience and effortlessly download high-
quality materials in just a few simple steps.
Plus, don’t miss out on exciting offers that
let you access a wealth of knowledge at the
best prices!
Exploring the Variety of Random
Documents with Different Content
This ebook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this ebook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.
Title: The Golden Gems of Life; Or, Gathered Jewels for the Home Circle
Language: English
TH E HOME CIR CL E.
OR,
BY
S. C. FERGUSON
AND
E. A. ALLEN.
Life.
Life ill spent—Life's Real Value—A Triumph or a Defeat—Power over Life
—What True Life Means—Prospective View of Life—The Journey Laborious
—Man does not live for himself—Failure of Success—Possibilities of Life—
Steady Aim Necessary—Life a Struggle—Duty of Right Living, 21
Home.
Thoughts of Home—We never forget Home—Power of Home Thoughts—
Home Memories—Home the Fountain of Civilization—Influence of Home—
Home Experiences—Home a Sensitive Place—Qualifications of Home—
Home Affections—In what a Home consists—Home Happiness composed of
Little Things—Home a Type of Heaven, 29
Home Circle.
Home Circle a Delightful Place—The Nursery of Affection—The Heart's
Garden—Importance of Home Affections—Requisites of Home Love—
Importance of Home Language and Habits—Home Circle the Center of
Affection—Love an Important Element of Home Happiness—Children in
Home Circle—Influence emanating from Home Circle—Home Circle soon
broken, 39
Infancy.
Infancy the Morning of Life—Parental Anxiety during Infancy—Parental
Responsibility—Parental Duty—Influence of Infants—Infants the Poetry of
the World—Infancy and Death—Graves of Infants, 54
Childhood.
Childhood the Happiest Time—Child's Soul without Character—Power of
Imitation with Children—Children incited by Example—Praise of Children—
Reproving Children—Parents' Duty to make Childhood Happy—Children the
Ornament of Home—Fleeting Period of Childhood, 60
Manhood.
Manhood the Isthmus between Two Extremes—Pursuits of Each Age—
Early Manhood Potential for Good—Claims of Society on Young Men—Young
Men's Duty in this Respect—Young Men should cultivate their Intellect—
Thinking makes True Manhood, 74
Womanhood.
True Womanhood a Noble Thing—Error Women make—Womanly Power
—Woman's Moral Influence—Source of Woman's Happiness—A Good
Woman never grows old, 80
Home Harmonies.
An Important Theme—Parents' Duty to make Happy Homes—Influence
of a Happy Home—In what a Happy Home consists—Business Man's Home
—Pictures in a Home—Conversation at Home—Parents should study
Children's Character, 89
Home Duties.
Duty ever at Hand—One Danger of Home Life—Children trained at Home
—Home Language—Happiness of Children—The Domestic Seminary—
Education of Children—Children's Duties to Parents, 97
Aim of Life.
An Aim Essential—Danger of an Aimless Life—Daily Need of Life—All can
accomplish Something—All must labor—Choice of an Occupation—Must do
your own deciding—A Second Profession—Manhood the Most Noble Aim, 104
Success or Failure.
All Desirous of Success—The Two Ends of Life—Success only won by Toil
—Danger of overlooking this Fact—Earnestness the Secret of Success—
Traits of Character Necessary to Success—All can accomplish Something—
In what True Success consists, 111
Dignity of Labor.
Labor the Lot of All—Labor a Glory—Civilization the Result of Labor—Life
necessarily Routine—Labor not an End of Life—Victories of Labor—All
Honest Work Honorable, 118
Perseverance.
Value of Perseverance—One Man's Work Compared with the Total
Amount—All Excellence the Result of Perseverance—Example of Gibbon—
Results of Human Perseverance—Nature's Lesson—Perseverance and
Genius, 125
Enterprise.
Enterprise distinct from Energy—Seeks for Novelty—Necessity for
Enterprise—Enterprise an Inheritance—Value of Self-reliance—Demands of
the Hour, 132
Energy.
Energy is Force of Character—Resolution and Energy—Energy and
Wisdom—Man's Duty—Value of Energy—Success the Result of Energy, 138
Punctuality.
Value of Punctuality—Punctuality a Positive Virtue—Punctuality the Life of
the Universe—The Value of Time—Punctuality gives Force to Character, 145
Concentration.
Necessity of Concentration—Must concentrate Energy for Success—Evil
of Dissipation—Concentration not One-sidedness—You must pay the Price
of Success, 151
Decision.
Quality of Decision—Necessity of Decision—Courageous Action necessary
—Foster's Remarks on Decision—Unhappy Results of Indecision—Decision
of Character a Necessity of the Present Age—Decision not Undue Haste, 159
Self-Confidence.
Value of Self-confidence—Difficulties a Positive Blessing—Reliance on
Good Name—Great Men have been Self-reliant—We admire Self-reliant
men, 166
Practical Talents.
What is meant by Practical Talents—Difference between Practical and
Speculative Ability—Knowledge of Men Indispensable—Intellectual
Knowledge—Education—Perfect Knowledge of Few Things, 172
Education.
Value of Intellect—Education a Development—Education covers the
Whole of Life—Education Right or Wrong—A Just Appreciation of Wisdom—
Importance of Exact Knowledge, 179
Mental Training.
Necessity of Mental Culture—Power of Trained Intellect—Mental Training
Pleasant and within Reach of All—Importance of Reading—Train the
Judgment—Thought, 187
Self-Culture.
In what Self-culture consists—Necessity of Physical Culture—Necessity of
Mental Culture—Educating Influence of Every-day Life—Moral Culture—
Self-culture ever pressing its Claims, 194
Literature.
Influence of Literature—Literature and Encouragement—Consolation of
Literature—Literature the Soul of Action—How to choose Books—Influence
of Reading on Personal Character—Power of the Press, 201
Mental Power.
Intellectual Triumphs—How shown—What Necessary for its Attainment—
Best Results obtained by training All the Faculties—Obtained by Years of
Exertion, 207
Choice of Companions.
Influence of Associates—Character shown by the Company you keep—No
One can afford to associate with Bad Company—Power of Bad Associates
to debase you—Persons whom Society has most to fear—Why Evil
Associates debase us—Influence of Good Company—Rank in Society
determined by Choice of Companions, 211
Friends.
Value of Friendship—Language of Friendship a Varied One—All need
Friends—Test of Friendship—Friendship a Tender Sentiment—Poverty a Test
of Friendship—Death of a Friendship—Old Friends, 217
Power of Custom.
Power of Custom—Likes and Dislikes—Creatures of Custom—Habit man's
Best Friend or Worst Enemy—How Habits grow—Evil Habits must be
conquered—Importance of Good Habits—How to form Good Habits, 223
Influence.
Nature of Influence—Influence Immortal—Solemn Thought—Every Thing
exerts Influence—Examples from Nature—Influence of Great Men—Your
Influence for Good or for Evil—Influence of Human Actions—Duty of
exerting a Good Influence—Responsibility for our Influence, 229
Character.
Character a Great Motive Power—Value of Good Character—Character is
Power—Difference between Character and Reputation—Character of Slow
Growth—Character our Own—Character always acting—Character a Grand
Thing, 237
Prudence.
Value of Prudence—Difficulty of defining Prudence—The Tongue of
Prudence, 244
Temperance.
Beauty of Temperance—Danger of Impulse—Temperance and Health—
Temperance dwells in the Heart—Temperance consists in Self-Control—
Must be Temperate to make the Most of Life, 247
Frugality.
In what Frugality consists—Frugality and Liberality—Frugality necessary
to Acquisition of Wealth—The Danger of going beyond the Income—
Influence of Economy on the Other Emotions, 252
Patience.
Patience the Ballast of the Soul—Necessity of Patience—Examples of
Eminent Men—Patience an Element of Home Happiness, 259
Self-Control.
Self-control a Form of Courage—Importance of Mental Faculties—
Government and Progress—Composure Highest Form of Power—Strong
Temper not always a Bad One—Man born for Dominion, 264
Courage.
In what Courage consists—Courage not confined to the Battlefield—
Occasion for Courage in Domestic Life—Courage of Endurance for
Conscience's Sake, 270
Charity.
Charity like Dew from Heaven—Charity a Lovable Trait—The Spirit of
Charity always doing Good—Universal Charity—Death and Charity, 275
Kindness.
Kindness the Music of Good-will—Kindness makes Sunshine—Should
never feel ashamed of Kindness—Kindness not necessarily shown in Gifts—
Kindness shown in Little Things—Influence of Unnoticed Kindness—
Showing Kindness a Noble Revenge—Kind Words and their influence, 280
Benevolence.
Doing Good a Happy Act—No Excess of Good Deeds—Benevolence
necessary to a Perfect Life—Liberality not Profuseness—Benevolence during
Life, 286
Veracity.
Truth always Consistent—Falsehood Perplexing—Strict Veracity has
regard to Looks and Actions—Lying a Cowardly Trait—Danger of too close
Adherence to Truth due to Lack of Caution, 292
Honor.
Honor a Glorious Trait of Character—Honor shown in Little Acts—Honor
and Virtue not the Same, 296
Policy.
Policy of the Nature of Cunning—Extent of this Principle—A Characteristic
Trait of the Age—Policy not Prudence or Caution—Policy not Discretion—
Danger of judging from Appearance, 299
Egotism.
Egotism a Disagreeable Trait—Egotism, how shown—Why We dislike
Egotism in Others—Danger of Self-love—The True Line between Egotism
and Self-conceit, 303
Vanity.
Vanity requires Skill in the Management—Danger of Love of Applause—
Vanity attacks Every Thing—Deception of Vanity—Vanity not wholly Bad—
Vanity ever present, 307
Selfishness.
Nature of Selfishness—Selfishness destructive of Happiness—Selfishness
a Narrow Quality—Selfishness contracts the Mind—Selfishness shows itself
in Many Ways—Last Hours of a Selfish Life, 311
Obstinacy.
Obstinacy a Trait of Low Minds—Peculiar Property of Obstinacy—
Obstinacy a Barrier to Improvement—Obstinacy not Firmness—Necessity of
sometimes yielding—Be not in a Hurry to change Opinion, 315
Slander.
Nature of Calumny—Slander never tired—Slander loved only by the Base
—Slander can not injure a Good Man—Slander easily started—Your Own
Character shown in describing Another's—Speak kindly of the Absent, 319
Irritability.
Irritability an Unpleasant Quality—The Source of Envy and Discontent—
Sin of fretting—Fretting easy to indulge—Evidence of a Moral Weakness—
Evidence of Littleness of Soul, 324
Envy.
Envy Born of Pride—Envy a Foolish Trait—Envy destroys One's Own
Happiness—Envy seeks to pull down Others—Envy Cruel in pursuit—Envy
grows in All Hearts, 328
Discontent.
A Discontented Man wretched—Discontent at Times wicked—Universality
of Discontent—Contentment Felicity—Duty to enjoy God's Blessing—
Contentment abides with Little Things—Contentment not Supine
Satisfaction—Folly of Discontent, 332
Deception.
Deceit an Obstacle to Happiness—Deceit in Friendship Most Detestable—
Deceit Inimical to Society—Deception and Hypocrisy—Deception assumes
Many Forms, 338
Intermeddling.
A Busybody disliked by All—Allied to Envy and Slander—The Source of
Many Troubles—Mischief wrought by an Intermeddler—Beware of Curiosity
—A Meddler not moved by the Spirit of Charity, 342
Anger.
Anger an Impotent Quality—Anger unmans a Man—Fit Occasions for
Indignation—Anger always Terrible or Ridiculous—Strong Temper not of
Necessity a Bad One, 346
Ambition.
Ambition a Deceptive Quality—Ambition fatal to Happiness—Ambition
fatal to Friendship—Ambition a Shadowy Quality—Ambition not Aspiration—
Ambition an Excessive Quality—Ambitious of True Honor a Grand Thing, 350
Politeness.
Importance of Politeness—Manner influences Worldly Opinion—
Fascinating Manners not Politeness—Politeness does not depend on
National Peculiarities—Politeness is Kindness—Description of a Gentleman—
Politeness comes of Sincerity—Politeness a Noble Trait of Character—
Business Value of Politeness—Good Manners can not be laid aside, 354
Sociability.
Mutual Intercourse necessary to Happiness—Society the Balm of Life—
Duty of doing Something for Society—All Social Duties Reciprocal—Society
the Spirit of Life—Anomalies of Society explained—Happy Influence of
Society, 361
Dignity.
Dignity defined—Dignity not Dependent on Place—Dignity the Ennobling
Quality of Politeness—Three Kinds of Dignity—Dignity not Conceit—Dignity
not Hauteur and Pride, 367
Affability.
Affability an Ornament—Affability of Value—Why Affability promotes
Success—Not well enough acquainted with Each Other—Duty of cultivating
Affability—Whom to be Affable with, 371
The Toilet.
Dress denotes the Man—Duty of Dressing—Love of Beauty right—Mental
Qualities shown by the Toilet—Beauty of Simplicity—The Style of Dress—
Dress need not be Costly—Dress of a Gentleman—Dandies Ridiculous, 375
Gentleness.
Gentleness a Pleasing Quality—We do not sufficiently value Gentleness—
Power of Gentleness—Gentleness belongs to Virtue—Great Power always
Gentle in Expression—Power in Gentle Words—Foundation of True
Gentleness, 382
Modesty.
Modesty a Mark of Wisdom—Modesty a Beautiful Setting to Talents—All
Great Events complete themselves in Silence—Modesty not Bashfulness—
Modesty Different from Reserve—Modesty Crowning Ornament of Woman, 387
Love.
Love a Ruling Element—Love a Need of the Heart—Power of Love—Love
a Proof of Moral Excellence—Love elevates Life—Duty to study the Nature
of Love—Love founded on Esteem and Respect—Love Dependent on
Etiquette—Woman's Love Stronger than Man's—Love purifies the Heart, 391
Courtship.
Importance of the Question—Mistaken Notions as to Time—Courtship
and Wedded Love—Happiness Dependent on Love—All Jest out of Place—
Duty of Careful Thought on Courtship—Marriage should be made a Study—
Courtship a Voyage of Discovery—The True Companion must be sought for
—A Critical Point in a Woman's Life—Must be an Equal—Courtship
Beautiful, 400
Marriage.
Marriage a Solemn Spectacle—Human Happiness ever accompanied by
Sorrow—Loving Trust of Woman—Importance of the Act—Marriage the
Entrance to a New World—Influence of a Wife's Moral Character—Discipline
of the Affections—Marriage a Necessity—Marriage should be made a Study
—Why Disappointments arise—Marriage a Real and Earnest Affair, 408
Single Life.
Marriage universally expected—Happiness of Single Life—Matrimony 416
brings Cares as well as Joys—Marriage not the Chief End of Life—Marriage
the More Preferable State—Jeremy Taylor's Contrast of the Two States—
Early Marriages Injudicious—Why Some remain Single,
Married Life.
Marriage the Bond of Social Order—Influence of a Good Wife—Nature of
the Marriage Tie—Gold can not purchase Love—Unhappy Marriages—
Human to see the Good Side of Things past—Happiness found in consulting
the Happiness of Others—Elevating Influence of Marriage, 422
Jealousy.
Baseness of this Passion—Distinction between Jealousy and Envy—
Jealousy preferable to Envy—Jealousy assumes Many Forms—No One
willing to Acknowledge Jealousy—Jealousy a Deadly Thing—Suspicion an
Enemy to Happiness, 449
Regret.
Regret a Sad Word—All have felt it—The Profoundest Sorrows self-
wrought—Death an Occasion of Much Regret—Shadowed Lives—How to
escape regret, 454
Memory.
Memory the Noblest Gift of Providence—Memory the Golden Cord—
Treasure of a Good Memory—Memory of Past Days—Slight Things suffice
to recall Past Memories—The Reminiscences of Youth—Memory sometimes
Painful—Memory crowds Years into Moments, 458
Hope.
Hope accomplishes All Things—Moderate Hope Helpful—Sustaining
Power of Hope—Should only hope for Probable Things—Hope ever with us
—Hope lives in the Future—The Morality of Hope—A True Hope ever
Present—Hopes and Fears—Rise above Trouble, 465
Prosperity.
Prosperity the Test of Character—A Degree of Prosperity to be
reasonably hoped for—Continuous Prosperity not a Good Thing—How to
prosper—Prosperity and Happiness not Identical—Early Adversity the
Foundation of Future Prosperity—Hardships a Good Thing, 472
Trifles.
Details Important—Trifles make Success—No Such Thing as Trifles in Life
—Trifles make the Difference between First and Second Class Work—
Unhappiness of Life caused by Trifles—Trifles make an Influence, 477
Leisure.
Spare Moments the Gold-dust of Time—Time our Estate—What can be
done in Leisure Time—Busiest Persons have always the Most Time—Time
can not be recalled—Effort required to employ Time Rightly—Death teaches
the Value of Time, 482
Happiness.
Happiness the Principal Thing—Deceitfulness of Happiness—Happiness
like To-morrow—Wealth and Fame not Necessary to Happiness—Can not
control our Outward Surroundings—Circumstances not essential to
Happiness—Disposition to enjoy Life what is wanted—Enjoy Present
Surroundings—Content is Happiness—Must seek for Happiness in the Right
Way, 488
True Nobility.
True Nobility often counterfeited—Man not rated by his Possessions—
Greatness often Obscure—Some Great in Evil—Influence of Noble Principles
—True Nobility Modest in Expression—Nobility of Character Reverential—
True Nobility within Reach of All, 494
A Good Name.
A Good Name the Richest Possession—Based on Permanent Excellence—
The Result of Individual Exertion—Influence of Youth on Life—Rewards of
possessing a Good Name—Evil of being devoid of it, 501
Meditation.
Meditation the Soul's Perspective Glass—Must learn to subdue the
Impulses—Meditation the Counselor of the Mental Powers—Guard against
Impure Thoughts—Duty of Thinking, 507
Principles.
Principles the Springs of our Actions—Danger of Loose Principles—Good
Principles ever acting—False Principles, 512
Opportunity.
Must Rightly use Small Opportunities—Opportunity and Ability—All have
a Few Opportunities—Must not wait for Opportunity, 516
Duty.
Duty ever Present with us—Duty based on Justice—We must will to do
our Duty—Duty and Might—Duty does not fear Censure, 520
Trials.
Life Full of Trials—Joy and Sorrow near together—Trials sent for our Good
—Wisdom won by Trials—Man like a Sword—Never meet Trouble Half Way
—Sorrow should remind us of God, 524
Sickness.
Sickness draws us near to God—Sickness softens the Heart—Sickness
renders us All Equals—The Blessings of Sickness—Sickness and Health—
Discipline of a Sick-bed, 529
Sorrow.
Sorrows gather around Great Souls—Sorrows make the Mind Genial—Life
abounds in Sorrowful Scenes—Sorrow the Noblest of Discipline—
Christianity a Religion of Sorrow—Suffering must be patiently submitted to
—Sorrow sometimes too Sacred to be spoken of—Must not give way to
Causeless Sorrow, 532
Poverty.
Poverty a Valued Discipline—Evils of Poverty Imaginary—Genius a Gift of
Poverty—The Advantages of struggling with Poverty—Poverty the Test of
Civility—Real Wants of Mankind but Few—Misfortune of beginning Life Rich
—Poverty of the Mind Most Deplorable, 539
Affliction.
The Elasticity of the Human Mind—Affliction a School of Virtue—Adversity
the Touchstone of Character—The Uncertainty of Human Life—Suffering
Divinely appointed—Thought when Death comes, 545
Disappointments.
Disappointments Divinely appointed—Disappointments the Lot of Man—
Shadowed Lives—Many disappointed because they do not look for
Happiness in the Right Way—Must meet Disappointments Bravely—Must be
accepted with Resignation—Disappointments sometimes arise from Undue
Expectations—Time disappoints our Cherished plans—Life a Variegated
Scene, 552
Failure.
Ultimate Success attained through Present Failure—Failures for our Own
Good—The True Hero perseveres in Spite of Failure—Do not give Way to
Despair—No One succeeds in All his Undertakings—Many ruined by Early
Success—How to view Past Mistakes—Sorrows of Mankind traced to
Blighted Hopes—The Brave-hearted Man rises Superior to Present
Difficulties, 557
Despondency.
Dark Hours as well as Bright Ones—Dire Effects of Despair—Influence of
Hope—Duty of resisting Despondency—Despondency a Failure of Duty—To
give Way to Despair not Manly—Lesson from Nature—Causeless Depression
of Spirits—Human Nature to see the Dark Side, 565
Faith.
Faith the Prophet of the Soul—Faith a Necessity—Faith a Reasonable
Thing—Faith ever with us—Difference between Morality and Faith—Faith
expands the Intellect—Must not judge the Outward Manifestations of Faith
—Faith and Works, 570
Worship.
Necessity of Prayer—Prayer arises from the Heart—Prayer and Outward
Action—Prayer the Password to Heaven—Family Worship—Necessity of
Daily Worship—Family Prayers knit together the Home—We often pray
Improperly—What God looketh at in Prayers—The Lord's Prayer, 575
Religion.
Religion binds Man to God—True Religion a Noble Thing—Effect of
Religion—Religion Full of Joys—Religion a Natural Thing—Religion not
established by Reason—Sorrow for Sin—Three Modes of bearing Ills of Life
—Surrounded by Motives to Religion—Religion a Refining Influence—
Religion teaches the Dignity of Common Life—Religion enforces the doing
of Common Duties, 581
God in Nature.
"The Heavens proclaim the Glory of God"—The Gospel written on Nature
—Distinguishing Features of God's Works—Study of Nature leads to True
Religion—Plan running through Nature's Works—Wondrous Natural Scenes
conduce to a Proper View of God, 588
The Bible.
Eulogy of the Bible—The Bible the Oldest Monument Extant—The Bible
Adapted to Every Condition—The Bible the Foundation of our Religious
Faith—The Bible our Constant Attendant—The Bible a Tried Book—The
Scriptures Adapted to All Times of Life—The Bible gives us a Sure
Foundation to stand upon, 592
Future Life.
Importance of this Question—Changes of the Seasons proving Future
Life—Men at All Times have pondered the Question of Death—Tenable
Ground for the Hope of Future Life—Visions on Death-beds, 596
"Waking,
Be awake to sleep no more."
ebookmasss.com