|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1196252537 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
200919s2020 caua ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d YDX
|d N$T
|d LQU
|d YDXIT
|d OCLCF
|d GW5XE
|d EBLCP
|d NLW
|d UKMGB
|d UMI
|d UKAHL
|d OCLCQ
|d OCLCO
|d COM
|d GUA
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBC0G1812
|2 bnb
|
016 |
7 |
|
|a 019940762
|2 Uk
|
019 |
|
|
|a 1196039143
|a 1197083012
|a 1197837981
|a 1198387658
|a 1203012700
|a 1206386203
|
020 |
|
|
|a 9781484262344
|q (electronic book)
|
020 |
|
|
|a 1484262344
|q (electronic book)
|
020 |
|
|
|z 1484262336
|
020 |
|
|
|z 9781484262337
|
024 |
8 |
|
|a 10.1007/978-1-4842-6
|
029 |
1 |
|
|a AU@
|b 000068068447
|
029 |
1 |
|
|a AU@
|b 000068846294
|
029 |
1 |
|
|a UKMGB
|b 019940762
|
035 |
|
|
|a (OCoLC)1196252537
|z (OCoLC)1196039143
|z (OCoLC)1197083012
|z (OCoLC)1197837981
|z (OCoLC)1198387658
|z (OCoLC)1203012700
|z (OCoLC)1206386203
|
037 |
|
|
|a com.springer.onix.9781484262344
|b Springer Nature
|
050 |
|
4 |
|a QA76.9.A25
|b S54 2020
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sheikh, Ahmed F.
|
245 |
1 |
0 |
|a CompTIA security+ certification study guide :
|b network security essentials /
|c Ahmed F. Sheikh.
|
264 |
|
1 |
|a [Berkeley, CA] :
|b Apress,
|c [2020]
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Chapter 1: General Security Concepts and Trends -- Information Security Model -- Operational Model of Computer Security -- Diversity of Defense -- Communications Security -- Access Control -- Authentication -- Social Engineering -- Security Trends -- Due Care and Due Diligence -- Summary -- Resources -- Chapter 2: Network Fundamentals and Infrastructure Security -- Network Architectures -- Network Topology -- Network Protocol -- The OSI Model -- IP Packet -- TCP vs. UDP -- Three-Way Handshake
|
505 |
8 |
|
|a Internet Control Message Protocol (ICMP) -- Packet Delivery -- Local Packet Delivery -- Remote Packet Delivery -- Domain Name System (DNS) -- Routing -- IP Addressing -- Subnetting -- Classes of Network Addresses -- Reserved Addresses -- Classless IP Addressing -- Network Address Translation (NAT) -- Security Zones -- Demilitarized Zone -- Virtual LAN (VLAN) -- Tunneling -- Infrastructure Security: Securing a Workstation -- Virtualization -- Hubs -- Bridges -- Switches -- Routers -- Firewalls -- Basic Packet Filtering -- Stateful Packet Filtering -- Modems -- Cable Modems -- DSL Modems
|
505 |
8 |
|
|a Virtual Private Networks -- Intrusion Detection System -- Mobile Devices -- Media Cables -- Security Concerns for Transmission Media -- Object Reuse -- Network-Attached Storage -- Summary -- Resources -- Chapter 3: Wireless and Intrusion Detection System Network Security -- Introduction to Wireless Networking -- 802.11 -- WAP -- WAP Vulnerabilities -- Bluetooth -- 802.11 Modulation -- 802.11 Individual Standards -- 802.11 Protocol -- Attacking 802.11 -- NetStumbler on a Windows PC -- Windows Displaying Access Points -- New Security Protocols -- Implementing 802.X
|
505 |
8 |
|
|a Types of Intrusion Detection Systems -- IDS Components -- NIDS Placement -- Network IDS -- Advantages -- Disadvantages -- Active vs. Passive NIDS -- Signatures -- IDS Matrix -- IDS Detection Models -- Firewall -- Intrusion Prevention Systems -- Proxy Servers -- Types of Proxy Servers -- Protocol Analyzers -- Honeypots and Honeynets -- Host-Based IDS (HIDS) -- HIDs Advantages vs. Disadvantages -- Modern HIDS -- Antivirus Products -- Antivirus Products: Signature-Based and Heuristic Scanning -- Signature-Based Scanning -- Heuristic Scanning -- Personal Software Firewalls
|
505 |
8 |
|
|a Pop-Up Blockers and Windows Defender -- Anti-spam -- Summary -- Chapter 4: Role of People in Security-Operational and Organizational Security -- Security Options -- The Operational Process -- Controls -- Physical Security -- Physical Barriers -- Environmental Issues -- Fire Suppression -- Electromagnetic Eavesdropping -- Location -- Role of People in Security -- Social Engineering -- Phishing -- Spear Phishing and Pharming -- Vishing -- Shoulder Surfing -- Security Hoaxes -- Password Best Practices -- Piggybacking -- Dumpster Diving -- Installing Unauthorized Hardware and Software
|
500 |
|
|
|a Physical Access by Non-employees
|
520 |
|
|
|a Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues. Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more. You will: Identify the concepts of confidentiality, integrity, and availability Implement secure network administration principles Apply appropriate risk mitigation strategies Explain the impact of physical security on computer and network security Use assessment tools to discover security threats and vulnerabilities Implement appropriate security controls when performing account management This book is for security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer technicians
|x Certification
|v Study guides.
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification
|v Study guides.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Computers
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Examinations
|2 fast
|
650 |
|
7 |
|a Computer security
|x Examinations
|2 fast
|
650 |
|
7 |
|a Computer technicians
|x Certification
|2 fast
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification
|2 fast
|
655 |
|
7 |
|a examination study guides.
|2 aat
|
655 |
|
7 |
|a Study guides
|2 fast
|
655 |
|
7 |
|a Study guides.
|2 lcgft
|
655 |
|
7 |
|a Guides de l'étudiant.
|2 rvmgf
|
776 |
0 |
8 |
|i Print version:
|a Sheikh, Ahmed F.
|t CompTIA Security+ Certification Study Guide : Network Security Essentials.
|d Berkeley, CA : Apress L.P., ©2020
|z 9781484262337
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484262344/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37890065
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6348875
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2620498
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 301535966
|
994 |
|
|
|a 92
|b IZTAP
|