|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn928939657 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
151112s2015 nyua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCA
|d TOH
|d C6I
|d EBLCP
|d OCLCO
|d CZL
|d INARC
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 9780071836180
|
020 |
|
|
|a 0071836187
|
020 |
|
|
|z 9780071836449
|
029 |
1 |
|
|a AU@
|b 000071984860
|
035 |
|
|
|a (OCoLC)928939657
|
037 |
|
|
|a CL0500000672
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 929.605
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Meyers, Mike,
|d 1961-
|e author.
|
245 |
1 |
0 |
|a Mike Meyers' CompTIA security+ certification guide :
|b (exam SY0-401) /
|c Mike Meyers, Bobby E. Rogers, Dawn Dunkerley.
|
246 |
3 |
|
|a Mike Meyers' Computing Technology Industry Association security plus certification guide
|
246 |
3 |
0 |
|a CompTIA security+ certification guide
|
250 |
|
|
|a Version 1.0.
|
264 |
|
1 |
|a New York :
|b McGraw-Hill Education,
|c 2015.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- About The Authors -- Contents at a Glance -- Contents -- Acknowledgments -- Introduction -- PART I The CompTIA Security+ Exam -- Module 1 Meet the Security+ Exam -- Why Do We Need Certification Exams? -- Demonstrating and Validating Skills and Knowledge -- The World of IT Security Certification -- The CompTIA Security+ Examination -- CompTIA as an Organization -- The Exam -- Module 1 Questions and Answers -- Module 2 Assessment Exam -- Assessment Questions -- Answers -- PART II Stepping Up to IT Security -- Module 3 The Basics of Security
|
505 |
8 |
|
|a The Goals of Security -- Confidentiality -- Integrity -- Availability -- Other Elements of Security -- Identification -- Authentication -- Authorization -- Auditing and Accountability -- Non-repudiation -- Security Concepts -- Controls -- Defense-in-Depth -- Data Sensitivity and Classification -- Principle of Least Privilege -- Separation of Duties -- Multi-person Control -- Mandatory Vacations -- Job Rotation -- Due Diligence and Due Care -- Module 3 Questions and Answers -- Module 4 Understanding Security Governance -- Security Governance -- Laws and Regulations -- Organizational Governance
|
505 |
8 |
|
|a Security Policies -- Module 4 Questions and Answers -- Module 5 Risk Management -- Risk Concepts -- Elements of Risk -- Putting It All Together: Risk -- Managing Risk -- Module 5 Questions and Answers -- Module 6 IT Risk Assessment -- Assessing Risk -- Risk Factors -- Risk Assessment Methods -- Quantitative Assessment -- Qualitative Assessment -- Putting It All Together: Determining Risk -- Risk Response -- Module 6 Questions and Answers -- PART III Core Security Concepts -- Module 7 Understanding Cryptography -- Cryptography Concepts -- What Is Cryptography? -- Cryptography Components
|
505 |
8 |
|
|a Module 7 Questions and Answers -- Module 8 Cryptographic Methods -- Cryptographic Algorithms -- Symmetric Algorithms -- Asymmetric Algorithms -- Hashing Algorithms -- Module 8 Questions and Answers -- Module 9 Application of Cryptographic Methods -- Application of Cryptographic Methods -- Cryptography Applications -- Cryptographic Method Considerations -- Module 9 Questions and Answers -- Module 10 Public Key Infrastructure -- PKI Concepts -- Keys, Algorithms, and Standards -- PKI Services -- Digital Certificates and PKI Structure -- PKI Considerations -- Trust Models
|
505 |
8 |
|
|a Module 10 Questions and Answers -- PART IV Authentication and Authorization -- Module 11 Understanding Identification and Authentication -- Authentication Concepts -- Authentication Factors -- Identification Methods -- Trusted Entity Authentication -- Module 11 Questions and Answers -- Module 12 Understanding Authorization -- Authorization Concepts -- Supporting Authorization -- Access Control Models -- Module 12 Questions and Answers -- Module 13 Authentication Methods and Services -- Authentication Concepts -- Authentication Protocols and Methods
|
520 |
|
|
|a An all-new CompTIA Security+ exam guide from top CompTIA training and exam prep expert Mike Meyers In Mike Meyers' CompTIA Security+ Certification Guide (Exam SY0-401), the bestselling author and leading authority on CompTIA A+ certification brings his highly effective methodology to IT security for the first time. Like the exam, this book goes beyond knowledge application and is designed to ensure that security personnel anticipate security risks and guard against them. Meyers' "in the trenches" voice and the clarity of his explanations make his books the bestselling self-study resources available for professional certification. Electronic content includes: 20+ lab simulations, 1+ hour of video training from Meyers, and hundreds of practice exam questions McGraw-Hill Professional is a Platinum-Level CompTIA Authorized Partner CAQC Authorized (CompTIA Approved Quality Curriculum) Includes Mike's toolbox of favorite network security related freeware/shareware
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
610 |
2 |
0 |
|a Computing Technology Industry Association.
|
610 |
2 |
7 |
|a Computing Technology Industry Association.
|2 fast
|0 (OCoLC)fst00707499
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer security
|x Examinations.
|2 fast
|0 (OCoLC)fst00872489
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification.
|2 fast
|0 (OCoLC)fst00907100
|
655 |
|
7 |
|a Study guides.
|2 fast
|0 (OCoLC)fst01423888
|
655 |
|
7 |
|a Study guides.
|2 lcgft
|
700 |
1 |
|
|a Rogers, Bobby E.,
|e author.
|
700 |
1 |
|
|a Dunkerley, Dawn,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Meyers, Michael, 1961-
|t Mike Meyers' CompTIA Security+ certification guide.
|d London : McGraw-Hill Education, 2015
|z 9780071836449
|w (OCoLC)896901187
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071836180/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6255860
|
938 |
|
|
|a Internet Archive
|b INAR
|n mikemeyerscompti0000meye_w9u6
|
994 |
|
|
|a 92
|b IZTAP
|