Cargando…

CompTIA security+ certification study guide : network security essentials /

Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and you will learn how to safeguard com...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sheikh, Ahmed F.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Berkeley, CA] : Apress, [2020]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1196252537
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 200919s2020 caua ob 001 0 eng d
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d YDX  |d N$T  |d LQU  |d YDXIT  |d OCLCF  |d GW5XE  |d EBLCP  |d NLW  |d UKMGB  |d UMI  |d UKAHL  |d OCLCQ  |d OCLCO  |d COM  |d GUA  |d OCLCQ  |d OCLCO 
015 |a GBC0G1812  |2 bnb 
016 7 |a 019940762  |2 Uk 
019 |a 1196039143  |a 1197083012  |a 1197837981  |a 1198387658  |a 1203012700  |a 1206386203 
020 |a 9781484262344  |q (electronic book) 
020 |a 1484262344  |q (electronic book) 
020 |z 1484262336 
020 |z 9781484262337 
024 8 |a 10.1007/978-1-4842-6 
029 1 |a AU@  |b 000068068447 
029 1 |a AU@  |b 000068846294 
029 1 |a UKMGB  |b 019940762 
035 |a (OCoLC)1196252537  |z (OCoLC)1196039143  |z (OCoLC)1197083012  |z (OCoLC)1197837981  |z (OCoLC)1198387658  |z (OCoLC)1203012700  |z (OCoLC)1206386203 
037 |a com.springer.onix.9781484262344  |b Springer Nature 
050 4 |a QA76.9.A25  |b S54 2020 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Sheikh, Ahmed F. 
245 1 0 |a CompTIA security+ certification study guide :  |b network security essentials /  |c Ahmed F. Sheikh. 
264 1 |a [Berkeley, CA] :  |b Apress,  |c [2020] 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Chapter 1: General Security Concepts and Trends -- Information Security Model -- Operational Model of Computer Security -- Diversity of Defense -- Communications Security -- Access Control -- Authentication -- Social Engineering -- Security Trends -- Due Care and Due Diligence -- Summary -- Resources -- Chapter 2: Network Fundamentals and Infrastructure Security -- Network Architectures -- Network Topology -- Network Protocol -- The OSI Model -- IP Packet -- TCP vs. UDP -- Three-Way Handshake 
505 8 |a Internet Control Message Protocol (ICMP) -- Packet Delivery -- Local Packet Delivery -- Remote Packet Delivery -- Domain Name System (DNS) -- Routing -- IP Addressing -- Subnetting -- Classes of Network Addresses -- Reserved Addresses -- Classless IP Addressing -- Network Address Translation (NAT) -- Security Zones -- Demilitarized Zone -- Virtual LAN (VLAN) -- Tunneling -- Infrastructure Security: Securing a Workstation -- Virtualization -- Hubs -- Bridges -- Switches -- Routers -- Firewalls -- Basic Packet Filtering -- Stateful Packet Filtering -- Modems -- Cable Modems -- DSL Modems 
505 8 |a Virtual Private Networks -- Intrusion Detection System -- Mobile Devices -- Media Cables -- Security Concerns for Transmission Media -- Object Reuse -- Network-Attached Storage -- Summary -- Resources -- Chapter 3: Wireless and Intrusion Detection System Network Security -- Introduction to Wireless Networking -- 802.11 -- WAP -- WAP Vulnerabilities -- Bluetooth -- 802.11 Modulation -- 802.11 Individual Standards -- 802.11 Protocol -- Attacking 802.11 -- NetStumbler on a Windows PC -- Windows Displaying Access Points -- New Security Protocols -- Implementing 802.X 
505 8 |a Types of Intrusion Detection Systems -- IDS Components -- NIDS Placement -- Network IDS -- Advantages -- Disadvantages -- Active vs. Passive NIDS -- Signatures -- IDS Matrix -- IDS Detection Models -- Firewall -- Intrusion Prevention Systems -- Proxy Servers -- Types of Proxy Servers -- Protocol Analyzers -- Honeypots and Honeynets -- Host-Based IDS (HIDS) -- HIDs Advantages vs. Disadvantages -- Modern HIDS -- Antivirus Products -- Antivirus Products: Signature-Based and Heuristic Scanning -- Signature-Based Scanning -- Heuristic Scanning -- Personal Software Firewalls 
505 8 |a Pop-Up Blockers and Windows Defender -- Anti-spam -- Summary -- Chapter 4: Role of People in Security-Operational and Organizational Security -- Security Options -- The Operational Process -- Controls -- Physical Security -- Physical Barriers -- Environmental Issues -- Fire Suppression -- Electromagnetic Eavesdropping -- Location -- Role of People in Security -- Social Engineering -- Phishing -- Spear Phishing and Pharming -- Vishing -- Shoulder Surfing -- Security Hoaxes -- Password Best Practices -- Piggybacking -- Dumpster Diving -- Installing Unauthorized Hardware and Software 
500 |a Physical Access by Non-employees 
520 |a Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues. Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more. You will: Identify the concepts of confidentiality, integrity, and availability Implement secure network administration principles Apply appropriate risk mitigation strategies Explain the impact of physical security on computer and network security Use assessment tools to discover security threats and vulnerabilities Implement appropriate security controls when performing account management This book is for security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and more. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 0 |a Computer technicians  |x Certification  |v Study guides. 
650 0 |a Electronic data processing personnel  |x Certification  |v Study guides. 
650 6 |a Sécurité informatique  |x Examens  |v Guides de l'étudiant. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Examens  |v Guides de l'étudiant. 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |x Examinations  |2 fast 
650 7 |a Computer security  |x Examinations  |2 fast 
650 7 |a Computer technicians  |x Certification  |2 fast 
650 7 |a Electronic data processing personnel  |x Certification  |2 fast 
655 7 |a examination study guides.  |2 aat 
655 7 |a Study guides  |2 fast 
655 7 |a Study guides.  |2 lcgft 
655 7 |a Guides de l'étudiant.  |2 rvmgf 
776 0 8 |i Print version:  |a Sheikh, Ahmed F.  |t CompTIA Security+ Certification Study Guide : Network Security Essentials.  |d Berkeley, CA : Apress L.P., ©2020  |z 9781484262337 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484262344/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37890065 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6348875 
938 |a EBSCOhost  |b EBSC  |n 2620498 
938 |a YBP Library Services  |b YANK  |n 301535966 
994 |a 92  |b IZTAP