|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn894906730 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
141110s2014 nyua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d DEBBG
|d VT2
|d REB
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCA
|d TOH
|d EBLCP
|d YDX
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 904280833
|a 1164490675
|a 1165384302
|
020 |
|
|
|a 9780071832175
|
020 |
|
|
|a 0071832173
|
020 |
|
|
|a 0071832149
|
020 |
|
|
|a 9780071832144
|
020 |
|
|
|z 9780071832144
|
029 |
1 |
|
|a DEBBG
|b BV042490096
|
029 |
1 |
|
|a DEBSZ
|b 434832782
|
035 |
|
|
|a (OCoLC)894906730
|z (OCoLC)904280833
|z (OCoLC)1164490675
|z (OCoLC)1165384302
|
037 |
|
|
|a CL0500000499
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b .D86 2014
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dunkerley, Dawn.
|
245 |
1 |
0 |
|a CompTIA security+ (exam SY0-401) /
|c Dawn Dunkerley, T.J. Samuelle.
|
246 |
3 |
0 |
|a CompTIA security+ certification passport (exam SY0-401)
|
250 |
|
|
|a 4th ed.
|
260 |
|
|
|a New York :
|b McGraw-Hill Education,
|c ©2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Mike Meyers' certification passport
|
588 |
0 |
|
|a Print version record.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Check-In -- Part I: Organizational Security -- Chapter 1: Organizational Security and Compliance -- Objective 1.01 Explain Risk-Related Concepts -- Risk Control Types -- Risk Assessment -- Risk Management Options -- False Positives and Negatives -- Use Organizational Policies to Reduce Risk -- Objective 1.02 Implement Appropriate Risk Mitigation Strategies -- Change Management Policy -- Incident Management and Response Policy -- Perform Routine Audits -- User Rights and Permissions Reviews
|
505 |
8 |
|
|a Data Loss Prevention and Regulatory Compliance -- Objective 1.03 Integrate with Third Parties -- Interoperability Agreements -- Privacy Considerations -- Risk Awareness -- Unauthorized Data Sharing -- Data Ownerships -- Data Backup -- Verification of Adherence -- Chapter 2: Security Training and Incident Response -- Objective 2.01 Explain the Importance of Security-Related Awareness and Training -- Accessing Policy Documentation -- Data and Documentation Policies -- Best Practices for User Habits -- Objective 2.02 Analyze and Differentiate Among Types of Social Engineering Attacks -- Phishing
|
505 |
8 |
|
|a Whaling -- Shoulder Surfing -- Tailgating -- Pharming -- Spim -- Vishing -- Spam -- Hoaxes -- Objective 2.03 Execute Appropriate Incident Response Procedures -- Preparation -- Incident Identification -- First Responders -- Incident Isolation -- Damage and Loss Control -- Escalation Policy -- Reporting and Notification -- Mitigation and Recovery Steps -- Lessons Learned -- Objective 2.04 Implement Basic Forensic Procedures -- Collection and Preservation of Evidence -- Chapter 3: Business Continuity and Disaster Recovery -- Objective 3.01 Compare and Contrast Aspects of Business Continuity
|
505 |
8 |
|
|a Recovery Plans -- Objective 3.02 Execute Disaster Recovery Plans and Procedures -- High Availability and Redundancy Planning -- Fault Tolerance -- Objective 3.03 Select the Appropriate Control to Meet the Goals of Security -- Objective 3.04 Explain the Impact and Proper Use of Environmental Controls -- Facility Construction Issues -- Environmental Issues -- Cable Shielding -- Fire Suppression -- Part II: Cryptography -- Chapter 4: Cryptography and Encryption Basics -- Objective 4.01 Utilize the Concepts of Cryptography -- Information Assurance -- Algorithms -- Steganography -- Digital Signatures
|
505 |
8 |
|
|a Basic Hashing Concepts -- Message Digest Hashing -- Secure Hash Algorithm (SHA) -- RIPEMD -- HMAC -- Objective 4.02 Use and Apply Appropriate Cryptographic Tools and Products -- Symmetric Encryption Algorithms -- Asymmetric Encryption Algorithms -- One-Time Pad -- Quantum Cryptography -- Implementing Encryption Protocols -- Wireless Encryption -- Chapter 5: Public Key Infrastructure -- Objective 5.01 Explain the Core Concepts of Public Key Infrastructure -- Digital Certificates -- Certificate Authorities -- Trust Models -- Key Management and Storage
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Examinations.
|2 fast
|0 (OCoLC)fst00872343
|
650 |
|
7 |
|a Computer security
|x Examinations.
|2 fast
|0 (OCoLC)fst00872489
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification.
|2 fast
|0 (OCoLC)fst00907100
|
655 |
|
7 |
|a Study guides.
|2 fast
|0 (OCoLC)fst01423888
|
655 |
|
7 |
|a Study guides.
|2 lcgft
|
700 |
1 |
|
|a Meyers, Mike,
|d 1961-
|
700 |
1 |
|
|a Samuelle, T. J.
|
710 |
2 |
|
|a Computing Technology Industry Association.
|
776 |
0 |
8 |
|i Print version :
|a Dunkerley, Dawn.
|t Mike Meyers' CompTIA security+ certification passport (exam SY0-401).
|b Fourth edition.
|d New York : McGraw-Hill Education, [2014]
|z 9780071832144
|w (DLC) 2014018875
|w (OCoLC)879662475
|
830 |
|
0 |
|a Mike Meyers' certification passport.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071832144/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6257070
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16841075
|
994 |
|
|
|a 92
|b IZTAP
|