|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1112074016 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
190812s2019 nyua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d YDX
|d EBLCP
|d OCLCO
|d CNWPU
|d CZL
|d OCLCQ
|d OCLCO
|d KSU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1164499589
|a 1165388512
|
020 |
|
|
|a 9781260453218
|
020 |
|
|
|a 1260453219
|
020 |
|
|
|z 9781260453201
|
035 |
|
|
|a (OCoLC)1112074016
|z (OCoLC)1164499589
|z (OCoLC)1165388512
|
037 |
|
|
|a CL0501000064
|b Safari Books Online
|
050 |
|
4 |
|a QA76.3
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Messier, Ric,
|e author.
|
245 |
1 |
0 |
|a GSEC, GIAC security essentials certification :
|b exam guide /
|c Ric Messier.
|
246 |
3 |
0 |
|a GIAC security essentials certification
|
246 |
3 |
|
|a Global Information Assurance Certification
|
246 |
1 |
|
|i At head of title:
|a All-in-one
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a New York :
|b McGraw-Hill,
|c [2019]
|
264 |
|
4 |
|c ©2019
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a All-in-one
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed August 8, 2019).
|
500 |
|
|
|a Previous edition published: 2014.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Cover -- About the Author -- Title Page -- Copyright Page -- Dedication -- Contents at a Glance -- Contents -- Acknowledgments -- Introduction -- Exam Objective Map: GSEC Exam -- Chapter 1 Information Security and the GIAC Security Essentials Certification -- The Evolution and Importance of Security -- Types of Security Threats -- Social Engineering -- Malware -- Identity Theft -- Mobile Device Threats -- Denial of Service -- Insider Threats -- About SANS -- About the GSEC Certification -- Accreditations -- Who the Exam Is For -- About the Exam -- The Purpose of This Book -- Test Tips
|
505 |
8 |
|
|a Chapter 2 Networking Fundamentals -- History of TCP/IP -- Networking Stacks -- The OSI Model -- TCP/IP Architecture -- Protocols -- Internet Protocol -- IP Version 4 Headers -- Addressing -- Fragmentation -- Internet Protocol Version 6 -- Internet Control Message Protocol (ICMP) -- Transmission Control Protocol (TCP) -- Reliable Delivery -- The Mitnick-Shimomura Attack -- User Datagram Protocol (UDP) -- Domain Name System (DNS) -- Chapter Review -- Questions -- Answers -- Exercise Answers -- Chapter 3 Network Design -- Cable Types -- Coaxial Cable -- Twisted Pair -- Fiber Optics
|
505 |
8 |
|
|a Network Topologies -- Bus Topology -- Star Topology -- Mesh Topology -- Full Mesh Topology -- Ring Topology -- Switching -- Ethernet -- Asynchronous Transfer Mode (ATM) -- Hubs, Bridges, and Switches -- Routing -- Distance Vector Routing -- Link-State Routing -- Network Security Technologies -- Routers -- Firewalls -- Intrusion Detection Systems -- Chapter Review -- Questions -- Answers -- Exercise 3-1 Answer -- Chapter 4 Authentication and Access Control -- Authentication -- Credentials -- Token-Based Authentication -- Biometrics -- RADIUS -- TACACS/TACACS+ -- Web-Based Authentication
|
505 |
8 |
|
|a Multifactor Authentication -- Authorization -- Principle of Least Privilege -- Accounting -- Access Control -- Discretionary Access Control -- Mandatory Access Control -- Role-Based Access Control -- Attribute-Based Access Control -- Single Sign-On -- Chapter Review -- Questions -- Answers -- Exercise 4-1 Answer -- Chapter 5 Cloud Computing -- Cloud Computing Services -- Storage as a Service -- Software as a Service (SaaS) -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Security Considerations -- Application Design -- Secure Software Development Lifecycle (S-SDLC)
|
505 |
8 |
|
|a Agile Methodology -- Deployment Considerations -- Private Clouds -- Chapter Review -- Questions -- Answers -- Chapter 6 Unix/Linux -- Unix History -- GNU -- The Kernel -- Filesystem Layout -- Using Linux -- General Utilities -- File Management -- Process Management -- Networking -- Software Management -- Debian -- Red Hat Enterprise Linux/CentOS -- Slackware -- Boot Process -- Process Management -- Processes and Threads -- Process Tools -- Signals -- System Management -- Backups -- Patch Management -- Job Scheduling -- User Management -- Configuration -- Logging and Log Management -- Monitoring
|
520 |
|
|
|a Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Fully updated coverage of every topic on the current version of the GSEC exam Get complete coverage of all the objectives on Global Information Assurance Certification's Security Essentials (GSEC) exam inside this comprehensive resource. GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference. Covers all exam topics, including: " etworking fundamentals " etwork design " loud computing " uthentication and access control " nix/Linux " indows " ncryption " isk management " irtual machines " ulnerability control " alware " ncident response " ireless technologies " og Management " oT and embedded devices Online content features: " wo practice exams " est engine that provides full-length practice exams and customizable quizzes " uthor videos
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification
|x Examinations
|v Study guides.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a COMPUTERS
|x Certification Guides
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Examinations
|2 fast
|
655 |
|
7 |
|a examination study guides.
|2 aat
|
655 |
|
7 |
|a Study guides
|2 fast
|
655 |
|
7 |
|a Study guides.
|2 lcgft
|
655 |
|
7 |
|a Guides de l'étudiant.
|2 rvmgf
|
776 |
0 |
8 |
|i Print version:
|a Messier, Ric.
|t GSEC GIAC Security Essentials Certification All-In-One Exam Guide, Second Edition.
|d : McGraw-Hill Education, ©2019
|
830 |
|
0 |
|a All-in-one (Series)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781260453218/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6258782
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16842724
|
994 |
|
|
|a 92
|b IZTAP
|