Cargando…

CompTIA security+ review guide /

"This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You'll find this book to be essential readi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Stewart, James Michael
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Wiley Pub., ©2009.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn614432864
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 100514s2009 inua o 001 0 eng d
010 |a  2008042927 
040 |a UMI  |b eng  |e pn  |c UMI  |d COO  |d CEF  |d OCLCQ  |d B24X7  |d DEBSZ  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCO  |d TEFOD  |d YDXCP  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d MERUC  |d OCLCQ  |d OCLCA  |d AU@  |d OCLCQ  |d WYU  |d STF  |d VT2  |d HS0  |d OCLCO  |d UKAHL  |d OCLCQ  |d INARC  |d OCLCO 
019 |a 759581145  |a 1058060157  |a 1064038049  |a 1103278015  |a 1129375800  |a 1152985060  |a 1192342261  |a 1240506762 
020 |a 0470404841 
020 |a 9780470404843 
020 |a 9781118059722 
020 |a 1118059727 
020 |z 9780470404843 
029 1 |a AU@  |b 000053318171 
029 1 |a DEBSZ  |b 355414368 
029 1 |a DEBSZ  |b 397004125 
029 1 |a DEBSZ  |b 449246930 
029 1 |a HEBIS  |b 291486525 
029 1 |a AU@  |b 000068978775 
035 |a (OCoLC)614432864  |z (OCoLC)759581145  |z (OCoLC)1058060157  |z (OCoLC)1064038049  |z (OCoLC)1103278015  |z (OCoLC)1129375800  |z (OCoLC)1152985060  |z (OCoLC)1192342261  |z (OCoLC)1240506762 
037 |a CL0500000067  |b Safari Books Online 
050 4 |a QA76.3  |b .S747 2009 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Stewart, James Michael. 
245 1 0 |a CompTIA security+ review guide /  |c James Michael Stewart. 
246 3 |a CompTIA security plus review guide 
260 |a Indianapolis, Ind. :  |b Wiley Pub.,  |c ©2009. 
300 |a 1 online resource (xxxv, 245 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a "This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You'll find this book to be essential reading if you are studying for Security+ certification and want to get up to speed on the most recent security topics"--Resource description page. 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright; Publisher's Note; Dedication; Acknowledgments; About the Author; Introduction; Chapter 1: Systems Security; 1.1 Differentiate among various systems security threats.; 1.2 Explain the security risks pertaining to system hardware and peripherals.; 1.3 Implement OS hardening practices and procedures to achieve workstation and server security.; 1.4 Carry out the appropriate procedures to establish application security.; 1.5 Implement security applications.; 1.6 Explain the purpose and application of virtualization technology.; Review Questions 
505 8 |a Answers to Review QuestionsChapter 2: Network Infrastructure; 2.1 Differentiate between the different ports & protocols, their respective threats and mitigation techniques.; 2.2 Distinguish between network design elements and components.; 2.3 Determine the appropriate use of network security tools to facilitate network security.; 2.4 Apply the appropriate network tools to facilitate network security.; 2.5 Explain the vulnerabilities and mitigations associated with network devices.; 2.6 Explain the vulnerabilities and mitigations associated with various transmission media. 
505 8 |a 2.7 Explain the vulnerabilities and implement mitigations associated with wireless networking.Review Questions; Answers to Review Questions; Chapter 3: Access Control; 3.1 Identify and apply industry best practices for access control methods.; 3.2 Explain common access control models and the differences between each.; 3.3 Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges.; 3.4 Apply appropriate security controls to file and print resources.; 3.5 Compare and implement logical access control methods. 
505 8 |a 3.6 Summarize the various authentication models and identify the components of each.3.7 Deploy various authentication models and identify the components of each.; 3.8 Explain the difference between identification and authentication (identity proofing).; 3.9 Explain and apply physical access security methods.; Review Questions; Answers to Review Questions; Chapter 4: Assessments and Audits; 4.1 Conduct risk assessments and implement risk mitigation.; 4.2 Carry out vulnerability assessments using common tools. 
505 8 |a 4.3 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.4.4 Use monitoring tools on systems and networks and detect security-related anomalies.; 4.5 Compare and contrast various types of monitoring methodologies.; 4.6 Execute proper logging procedures and evaluate the results.; 4.7 Conduct periodic audits of system security settings.; Review Questions; Answers to Review Questions; Chapter 5: Cryptography; 5.1 Explain general cryptography concepts. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Electronic data processing personnel  |x Certification. 
650 0 |a Computer networks  |x Examinations  |v Study guides. 
650 0 |a Computer technicians  |x Certification  |v Study guides. 
650 6 |a Réseaux d'ordinateurs  |x Examens  |v Guides de l'étudiant. 
650 7 |a Electronic data processing personnel  |x Certification.  |2 blmlsh 
650 7 |a Computer networks  |x Examinations  |x Study guides.  |2 blmlsh 
650 7 |a Computer technicians  |x Certification  |x Study guides.  |2 blmlsh 
650 7 |a Computer networks  |x Examinations  |2 fast 
650 7 |a Computer technicians  |x Certification  |2 fast 
650 7 |a Electronic data processing personnel  |x Certification  |2 fast 
655 7 |a Study guides  |2 fast 
776 0 8 |i Print version:  |a Stewart, James Michael.  |t CompTIA security+.  |d Indianapolis, Ind. : Wiley Pub., ©2009  |z 9780470404843  |w (DLC) 2008042927  |w (OCoLC)233544902 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780470404843/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Internet Archive  |b INAR  |n comptiasecurityr0000stew_w9o6 
938 |a Askews and Holts Library Services  |b ASKH  |n AH16074369 
938 |a Books 24x7  |b B247  |n bks00029810 
938 |a YBP Library Services  |b YANK  |n 9659571 
994 |a 92  |b IZTAP