|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn614432864 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
100514s2009 inua o 001 0 eng d |
010 |
|
|
|a 2008042927
|
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d CEF
|d OCLCQ
|d B24X7
|d DEBSZ
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCO
|d TEFOD
|d YDXCP
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d LIV
|d MERUC
|d OCLCQ
|d OCLCA
|d AU@
|d OCLCQ
|d WYU
|d STF
|d VT2
|d HS0
|d OCLCO
|d UKAHL
|d OCLCQ
|d INARC
|d OCLCO
|
019 |
|
|
|a 759581145
|a 1058060157
|a 1064038049
|a 1103278015
|a 1129375800
|a 1152985060
|a 1192342261
|a 1240506762
|
020 |
|
|
|a 0470404841
|
020 |
|
|
|a 9780470404843
|
020 |
|
|
|a 9781118059722
|
020 |
|
|
|a 1118059727
|
020 |
|
|
|z 9780470404843
|
029 |
1 |
|
|a AU@
|b 000053318171
|
029 |
1 |
|
|a DEBSZ
|b 355414368
|
029 |
1 |
|
|a DEBSZ
|b 397004125
|
029 |
1 |
|
|a DEBSZ
|b 449246930
|
029 |
1 |
|
|a HEBIS
|b 291486525
|
029 |
1 |
|
|a AU@
|b 000068978775
|
035 |
|
|
|a (OCoLC)614432864
|z (OCoLC)759581145
|z (OCoLC)1058060157
|z (OCoLC)1064038049
|z (OCoLC)1103278015
|z (OCoLC)1129375800
|z (OCoLC)1152985060
|z (OCoLC)1192342261
|z (OCoLC)1240506762
|
037 |
|
|
|a CL0500000067
|b Safari Books Online
|
050 |
|
4 |
|a QA76.3
|b .S747 2009
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Stewart, James Michael.
|
245 |
1 |
0 |
|a CompTIA security+ review guide /
|c James Michael Stewart.
|
246 |
3 |
|
|a CompTIA security plus review guide
|
260 |
|
|
|a Indianapolis, Ind. :
|b Wiley Pub.,
|c ©2009.
|
300 |
|
|
|a 1 online resource (xxxv, 245 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a "This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You'll find this book to be essential reading if you are studying for Security+ certification and want to get up to speed on the most recent security topics"--Resource description page.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright; Publisher's Note; Dedication; Acknowledgments; About the Author; Introduction; Chapter 1: Systems Security; 1.1 Differentiate among various systems security threats.; 1.2 Explain the security risks pertaining to system hardware and peripherals.; 1.3 Implement OS hardening practices and procedures to achieve workstation and server security.; 1.4 Carry out the appropriate procedures to establish application security.; 1.5 Implement security applications.; 1.6 Explain the purpose and application of virtualization technology.; Review Questions
|
505 |
8 |
|
|a Answers to Review QuestionsChapter 2: Network Infrastructure; 2.1 Differentiate between the different ports & protocols, their respective threats and mitigation techniques.; 2.2 Distinguish between network design elements and components.; 2.3 Determine the appropriate use of network security tools to facilitate network security.; 2.4 Apply the appropriate network tools to facilitate network security.; 2.5 Explain the vulnerabilities and mitigations associated with network devices.; 2.6 Explain the vulnerabilities and mitigations associated with various transmission media.
|
505 |
8 |
|
|a 2.7 Explain the vulnerabilities and implement mitigations associated with wireless networking.Review Questions; Answers to Review Questions; Chapter 3: Access Control; 3.1 Identify and apply industry best practices for access control methods.; 3.2 Explain common access control models and the differences between each.; 3.3 Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges.; 3.4 Apply appropriate security controls to file and print resources.; 3.5 Compare and implement logical access control methods.
|
505 |
8 |
|
|a 3.6 Summarize the various authentication models and identify the components of each.3.7 Deploy various authentication models and identify the components of each.; 3.8 Explain the difference between identification and authentication (identity proofing).; 3.9 Explain and apply physical access security methods.; Review Questions; Answers to Review Questions; Chapter 4: Assessments and Audits; 4.1 Conduct risk assessments and implement risk mitigation.; 4.2 Carry out vulnerability assessments using common tools.
|
505 |
8 |
|
|a 4.3 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.4.4 Use monitoring tools on systems and networks and detect security-related anomalies.; 4.5 Compare and contrast various types of monitoring methodologies.; 4.6 Execute proper logging procedures and evaluate the results.; 4.7 Conduct periodic audits of system security settings.; Review Questions; Answers to Review Questions; Chapter 5: Cryptography; 5.1 Explain general cryptography concepts.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification.
|
650 |
|
0 |
|a Computer networks
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer technicians
|x Certification
|v Study guides.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Examinations
|x Study guides.
|2 blmlsh
|
650 |
|
7 |
|a Computer technicians
|x Certification
|x Study guides.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Examinations
|2 fast
|
650 |
|
7 |
|a Computer technicians
|x Certification
|2 fast
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification
|2 fast
|
655 |
|
7 |
|a Study guides
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Stewart, James Michael.
|t CompTIA security+.
|d Indianapolis, Ind. : Wiley Pub., ©2009
|z 9780470404843
|w (DLC) 2008042927
|w (OCoLC)233544902
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780470404843/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Internet Archive
|b INAR
|n comptiasecurityr0000stew_w9o6
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH16074369
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00029810
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9659571
|
994 |
|
|
|a 92
|b IZTAP
|