MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn894906730
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 141110s2014 nyua o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d DEBBG  |d VT2  |d REB  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCA  |d TOH  |d EBLCP  |d YDX  |d OCLCO  |d OCLCQ 
019 |a 904280833  |a 1164490675  |a 1165384302 
020 |a 9780071832175 
020 |a 0071832173 
020 |a 0071832149 
020 |a 9780071832144 
020 |z 9780071832144 
029 1 |a DEBBG  |b BV042490096 
029 1 |a DEBSZ  |b 434832782 
035 |a (OCoLC)894906730  |z (OCoLC)904280833  |z (OCoLC)1164490675  |z (OCoLC)1165384302 
037 |a CL0500000499  |b Safari Books Online 
050 4 |a QA76.9.A25  |b .D86 2014 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Dunkerley, Dawn. 
245 1 0 |a CompTIA security+ (exam SY0-401) /  |c Dawn Dunkerley, T.J. Samuelle. 
246 3 0 |a CompTIA security+ certification passport (exam SY0-401) 
250 |a 4th ed. 
260 |a New York :  |b McGraw-Hill Education,  |c ©2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Mike Meyers' certification passport 
588 0 |a Print version record. 
500 |a Includes index. 
505 0 |a Cover -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Check-In -- Part I: Organizational Security -- Chapter 1: Organizational Security and Compliance -- Objective 1.01 Explain Risk-Related Concepts -- Risk Control Types -- Risk Assessment -- Risk Management Options -- False Positives and Negatives -- Use Organizational Policies to Reduce Risk -- Objective 1.02 Implement Appropriate Risk Mitigation Strategies -- Change Management Policy -- Incident Management and Response Policy -- Perform Routine Audits -- User Rights and Permissions Reviews 
505 8 |a Data Loss Prevention and Regulatory Compliance -- Objective 1.03 Integrate with Third Parties -- Interoperability Agreements -- Privacy Considerations -- Risk Awareness -- Unauthorized Data Sharing -- Data Ownerships -- Data Backup -- Verification of Adherence -- Chapter 2: Security Training and Incident Response -- Objective 2.01 Explain the Importance of Security-Related Awareness and Training -- Accessing Policy Documentation -- Data and Documentation Policies -- Best Practices for User Habits -- Objective 2.02 Analyze and Differentiate Among Types of Social Engineering Attacks -- Phishing 
505 8 |a Whaling -- Shoulder Surfing -- Tailgating -- Pharming -- Spim -- Vishing -- Spam -- Hoaxes -- Objective 2.03 Execute Appropriate Incident Response Procedures -- Preparation -- Incident Identification -- First Responders -- Incident Isolation -- Damage and Loss Control -- Escalation Policy -- Reporting and Notification -- Mitigation and Recovery Steps -- Lessons Learned -- Objective 2.04 Implement Basic Forensic Procedures -- Collection and Preservation of Evidence -- Chapter 3: Business Continuity and Disaster Recovery -- Objective 3.01 Compare and Contrast Aspects of Business Continuity 
505 8 |a Recovery Plans -- Objective 3.02 Execute Disaster Recovery Plans and Procedures -- High Availability and Redundancy Planning -- Fault Tolerance -- Objective 3.03 Select the Appropriate Control to Meet the Goals of Security -- Objective 3.04 Explain the Impact and Proper Use of Environmental Controls -- Facility Construction Issues -- Environmental Issues -- Cable Shielding -- Fire Suppression -- Part II: Cryptography -- Chapter 4: Cryptography and Encryption Basics -- Objective 4.01 Utilize the Concepts of Cryptography -- Information Assurance -- Algorithms -- Steganography -- Digital Signatures 
505 8 |a Basic Hashing Concepts -- Message Digest Hashing -- Secure Hash Algorithm (SHA) -- RIPEMD -- HMAC -- Objective 4.02 Use and Apply Appropriate Cryptographic Tools and Products -- Symmetric Encryption Algorithms -- Asymmetric Encryption Algorithms -- One-Time Pad -- Quantum Cryptography -- Implementing Encryption Protocols -- Wireless Encryption -- Chapter 5: Public Key Infrastructure -- Objective 5.01 Explain the Core Concepts of Public Key Infrastructure -- Digital Certificates -- Certificate Authorities -- Trust Models -- Key Management and Storage 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 0 |a Electronic data processing personnel  |x Certification. 
650 6 |a Sécurité informatique  |x Examens  |v Guides de l'étudiant. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Examens  |v Guides de l'étudiant. 
650 7 |a Computer networks  |x Security measures  |x Examinations.  |2 fast  |0 (OCoLC)fst00872343 
650 7 |a Computer security  |x Examinations.  |2 fast  |0 (OCoLC)fst00872489 
650 7 |a Electronic data processing personnel  |x Certification.  |2 fast  |0 (OCoLC)fst00907100 
655 7 |a Study guides.  |2 fast  |0 (OCoLC)fst01423888 
655 7 |a Study guides.  |2 lcgft 
700 1 |a Meyers, Mike,  |d 1961- 
700 1 |a Samuelle, T. J. 
710 2 |a Computing Technology Industry Association. 
776 0 8 |i Print version :  |a Dunkerley, Dawn.  |t Mike Meyers' CompTIA security+ certification passport (exam SY0-401).  |b Fourth edition.  |d New York : McGraw-Hill Education, [2014]  |z 9780071832144  |w (DLC) 2014018875  |w (OCoLC)879662475 
830 0 |a Mike Meyers' certification passport. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071832144/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6257070 
938 |a YBP Library Services  |b YANK  |n 16841075 
994 |a 92  |b IZTAP