Nicht aus der Schweiz? Besuchen Sie lehmanns.de
CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401) - Wm. Arthur Conklin, Greg White, Dwayne Williams, Chuck Cothren, Roger Davis

CompTIA Security+ All-in-One Exam Guide, Fourth Edition (Exam SY0-401)

Buch
704 Seiten
2014 | 4th edition
McGraw-Hill Professional (Verlag)
978-0-07-184124-5 (ISBN)
CHF 69,80 inkl. MwSt
zur Neuauflage
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Co-written by two of the leading IT security academics, this exam guide offers complete coverage of the latest release of CompTIA's fastest-growing certification, CompTIA Security+, and includes two electronic practice exams.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.




Get complete coverage of all objectives included on the latest release of the CompTIA Security+ exam from this comprehensive resource. Cowritten by leading informationsecurity experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass CompTIA Security+ exam SY0-401, this definitive volume also serves as an essential on-the-job reference.

COVERS ALL EXAM DOMAINS, INCLUDING:

Network security
Compliance and operational security
Threats and vulnerabilities
Application, data, and host security
Access control and identity management
Cryptography

ELECTRONIC CONTENT INCLUDESl



200 practice exam questions
Test engine that provides practice exams or quizzesthat can be customized by chapter or exam objective
PDF copy of the book

Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklins interests are information security, systems theory, and secure software design. Greg White (San Antonio, TX), CompTIA Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA. Chuck Cothren is a Research Scientist at University of Texas at San Antonio (UTSA) Center for Infrastructure Assurance and Security (CIAS) and currently serves on the Information Security Associations Alamo Chapter Board of Directors. Mr. Cothren has a wide array of security experience including performing controlled penetration testing, network security policies, computer intrusion forensics, and computer training. He is a Certified Information Systems Security Professional (CISSP) and has co-authored other McGraw-Hill/Osborne titles. Mr. Cothren holds a B.S. in Industrial Distribution from Texas A&M University. Roger L. Davis is a Senior Internal Audit Manager at NuSkin Enterprises and is responsible for evaluating global business operations in over 35 countries. He is a retired Air Force Colonel with over 20 years of military and information security experience. Mr. Davis is a Certified Information Systems Security Professional (CISSP) and holds a Masters Degree in Computer Science from George Washington University.

Part I Network Security
Chapter 1 Network Device Configuration
Chapter 2 Secure Network Administration
Chapter 3 Secure Network Design
Chapter 4 Secure Wireless Networking
Part II Compliance and Operational Security
Chapter 5 Risk Concepts
Chapter 6 System Integration Processes
Chapter 7 Risk Management
Chapter 8 Digital Forensics and Incident Response
Chapter 9 Security Awareness and Training
Chapter 10 Physical Security and Environmental Controls
Chapter 11 Security Controls
Part III Threats and Vulnerabilities
Chapter 12 Attacks and Malware
Chapter 13 Social Engineering
Chapter 14 Application and Wireless Attacks
Chapter 15 Mitigation Techniques
Chapter 16 Threat and Vulnerability Discovery
Part IV Application, Data, and Host Security
Chapter 17 Application Security Controls
Chapter 18 Mobile Device Security
Chapter 19 Host-based Security
Chapter 20 Securing Alternative Environments
Part V Access Control and Identity Management
Chapter 21 Access Control and Identity Management
Chapter 22 Account Management
Part VI Cryptography
Chapter 23 Cryptographic Concepts
Chapter 24 Cryptographic Methods
Appendices and Glossary
Appendix A OSI Model and Internet Protocols
Appendix B About the CD
Glossary
Index

Zusatzinfo 30 Illustrations, unspecified
Sprache englisch
Maße 188 x 236 mm
Gewicht 1114 g
Themenwelt Schulbuch / Wörterbuch Lexikon / Chroniken
Informatik Netzwerke Sicherheit / Firewall
Informatik Office Programme Outlook
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
Informatik Weitere Themen Zertifizierung
ISBN-10 0-07-184124-5 / 0071841245
ISBN-13 978-0-07-184124-5 / 9780071841245
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95