|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBOOKCENTRAL_ocn794260402 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
120428s2012 inua ob 000 0 eng d |
010 |
|
|
|z 2011945563
|
040 |
|
|
|a B24X7
|b eng
|e pn
|c B24X7
|d E7B
|d COO
|d DEBSZ
|d OCLCQ
|d YDXCP
|d OCLCQ
|d OCLCO
|d OCLCF
|d UKDOC
|d OCLCQ
|d AZU
|d Z5A
|d REB
|d OCLCO
|d NLGGC
|d OCL
|d OCLCQ
|d AZK
|d CNNOR
|d MOR
|d PIFAG
|d NRC
|d LIV
|d OCLCQ
|d OCLCO
|d U3W
|d OCLCA
|d BUF
|d STF
|d WRM
|d INT
|d VT2
|d OCLCQ
|d OCLCO
|d WYU
|d GDC
|d OCLCQ
|d A6Q
|d DKC
|d OCLCQ
|d UKCRE
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
015 |
|
|
|a GBB191498
|2 bnb
|
016 |
7 |
|
|a 015860346
|2 Uk
|
019 |
|
|
|a 784965269
|a 787845442
|a 961531521
|a 962709781
|a 988458439
|a 988459602
|a 988829990
|a 992027598
|a 1037753342
|a 1038673721
|a 1055372344
|a 1064962761
|a 1081071110
|a 1083602302
|a 1103257936
|a 1129335348
|a 1153007762
|a 1153507558
|a 1192341612
|a 1228539321
|
020 |
|
|
|a 9781118222720
|q (ebk)
|
020 |
|
|
|a 1118222725
|q (ebk)
|
020 |
|
|
|a 9781118236611
|q (ebk)
|
020 |
|
|
|a 1118236610
|q (ebk)
|
020 |
|
|
|a 9781118261521
|q (ebk)
|
020 |
|
|
|a 1118261526
|q (ebk)
|
020 |
|
|
|z 9781118083192
|q (pbk. ;
|q alk. paper)
|
020 |
|
|
|z 1118083199
|q (pbk. ;
|q alk. paper)
|
029 |
1 |
|
|a AU@
|b 000053011401
|
029 |
1 |
|
|a CHNEW
|b 000619242
|
029 |
1 |
|
|a DEBSZ
|b 372896685
|
029 |
1 |
|
|a NZ1
|b 14694154
|
029 |
1 |
|
|a NZ1
|b 14699000
|
029 |
1 |
|
|a AU@
|b 000073085927
|
035 |
|
|
|a (OCoLC)794260402
|z (OCoLC)784965269
|z (OCoLC)787845442
|z (OCoLC)961531521
|z (OCoLC)962709781
|z (OCoLC)988458439
|z (OCoLC)988459602
|z (OCoLC)988829990
|z (OCoLC)992027598
|z (OCoLC)1037753342
|z (OCoLC)1038673721
|z (OCoLC)1055372344
|z (OCoLC)1064962761
|z (OCoLC)1081071110
|z (OCoLC)1083602302
|z (OCoLC)1103257936
|z (OCoLC)1129335348
|z (OCoLC)1153007762
|z (OCoLC)1153507558
|z (OCoLC)1192341612
|z (OCoLC)1228539321
|
050 |
|
4 |
|a QA76.3
|b .G744 2012eb
|
082 |
0 |
4 |
|a 005.8/076
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gregg, Michael
|q (Michael C.)
|1 https://id.oclc.org/worldcat/entity/E39PBJwMxyRv8xrQGt4d7JmKh3
|
245 |
1 |
0 |
|a CASP CompTIA Advanced Security Practitioner study guide (Exam CAS-001) /
|c Michael Gregg, Billy Haines.
|
246 |
3 |
0 |
|a CASP
|
246 |
3 |
0 |
|a CompTIA Advanced Security Practitioner
|
246 |
3 |
0 |
|a CompTIA Advanced Security Practitioner study guide
|
260 |
|
|
|a Indianapolis, Ind. :
|b John Wiley & Sons,
|c ©2012.
|
300 |
|
|
|a 1 online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
490 |
1 |
|
|a Sybex serious skills
|
500 |
|
|
|a Title from title screen.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
0 |
|t Foreword --
|t Introduction --
|t Before You Begin the CompTIA CASP℗ Certification Exam --
|t How to Become a CASP Certified℗ Professional --
|t Who Should Read This Book? --
|t How This Book Is Organized --
|t Exam Strategy --
|t How to Use This Book and Companion℗ Website --
|t The CASP (2011 Edition) Exam Objectives --
|g 1.
|t : Cryptographic Tools and Techniques --
|t The History of Cryptography --
|t Cryptographic Services --
|t Symmetric Encryption --
|t Asymmetric Encryption --
|t Hybrid Encryption --
|t Hashing --
|t Digital Signatures --
|t Public Key Infrastructure --
|t Cryptographic Solutions --
|t Cryptographic AttacksSummary --
|t Exam Essentials --
|t Review Questions --
|g 2.
|t : Comprehensive Security Solutions --
|t Advanced Network Design --
|t TCP/IP --
|t Secure Communication Solutions --
|t Secure Facility Solutions --
|t Secure Network Infrastructure Design --
|t Summary --
|t Exam Essentials --
|t Review Questions --
|g 3.
|t : Securing Virtualized, Distributed, and Shared Computing --
|t Enterprise Security --
|t Cloud Computing --
|t Virtualization --
|t Virtual LANs --
|t Enterprise Storage --
|t Summary --
|t Exam Essentials --
|t Review Questions --
|g 4.
|t : Host Security --
|t Firewalls and Access Control Lists --
|t Host-Based Firewalls --
|t Trusted Operating System --
|t Endpoint Security SoftwareAnti-malware --
|t Host Hardening --
|t Asset Management --
|t Data Exfiltration --
|t Intrusion Detection and Prevention --
|t Summary --
|t Exam Essentials --
|t Review Questions --
|g 5.
|t : Application Security and Penetration Testing --
|t Application Security --
|t Specific Application Issues --
|t Application Sandboxing --
|t Application Security Framework --
|t Standard Libraries --
|t Secure Coding Standards --
|t Application Exploits --
|t Escalation of Privilege --
|t Improper Storage of Sensitive Data --
|t Cookie Storage and Transmission --
|t Process Handling at the Client and Server --
|t Security Assessments and Penetration℗ Testing --
|t Summary --
|t Exam EssentialsReview Questions --
|g 6.
|t : Risk Management --
|t Risk Terminology --
|t Identifying Vulnerabilities --
|t Operational Risks --
|t The Risk Assessment Process --
|t Best Practices for Risk Assessments --
|t Summary --
|t Exam Essentials --
|t Review Questions --
|g 7.
|t : Policies, Procedures, and Incident Response --
|t A High-Level View of Documentation --
|t Business Documents Used to℗ Support℗ Security --
|t Documents and Controls Used for℗ Sensitive Information --
|t Auditing Requirements and Frequency --
|t The Incident Response Framework --
|t Digital Forensics --
|t The Role of Training and Employee℗ Awareness --
|t Summary --
|t Exam Essentials --
|t Review Questions --
|g 8.
|t : Security Research and Analysis --
|t Analyzing Industry Trends and Outlining℗ Potential Impact --
|t Carrying Out Relevant Analysis to℗ Secure the Enterprise --
|t Summary --
|t Exam Essentials --
|t Review Questions --
|g 9.
|t : Enterprise Security Integration --
|t Integrate Enterprise Disciplines to℗ Achieve Secure Solutions --
|t Explain the Security Impact of Interorganizational Change --
|t Summary --
|t Exam Essentials --
|t Review Questions --
|g 10.
|t : Security Controls for Communication and Collaboration --
|t Selecting and Distinguishing the Appropriate Security Controls --
|t Advanced Authentication Tools, Techniques, and Concepts.
|
520 |
|
|
|a Get Prepared for CompTIA Advanced Security Practitioner (CASP) Exam Targeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused on the new CompTIA Advanced Security Practitioner (CASP) Exam CAS-001. Veteran IT security expert and author Michael Gregg details the technical knowledge and skills you need to conceptualize, design, and engineer secure solutions across complex enterprise environments. He prepares you for aspects of the certification test that as.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
610 |
2 |
0 |
|a Computing Technology Industry Association
|x Examinations
|v Study guides.
|
610 |
2 |
7 |
|a Computing Technology Industry Association
|2 fast
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification.
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Examinations
|2 fast
|
650 |
|
7 |
|a Computer security
|x Examinations
|2 fast
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification
|2 fast
|
650 |
|
7 |
|a Examinations
|2 fast
|
655 |
|
7 |
|a Study guides
|2 fast
|
700 |
1 |
|
|a Haines, Billy.
|4 aut
|
758 |
|
|
|i has work:
|a CASP CompTIA Advanced Security Practitioner study guide (Exam CAS-001) (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGmMFJwyJGpHbHbp3vK7xP
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Gregg, Michael H.
|t CASP.
|d Indianapolis, IN : Wiley Pub., 2012
|w (DLC) 2011945563
|
830 |
|
0 |
|a Serious skills.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=817999
|z Texto completo
|
938 |
|
|
|a 123Library
|b 123L
|n 48342
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00046078
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10538597
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7437003
|
994 |
|
|
|a 92
|b IZTAP
|