SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601)

Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601), 6. udgave

Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601)

Wm. Arthur Conklin, Greg White, Chuck Cothren, Roger L. Davis og Dwayne Williams
(2021)
McGraw-Hill Education
982,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 10 hverdage

Detaljer om varen

  • 6. Udgave
  • Paperback: 1072 sider
  • Udgiver: McGraw-Hill Education (Oktober 2021)
  • Forfattere: Wm. Arthur Conklin, Greg White, Chuck Cothren, Roger L. Davis og Dwayne Williams
  • ISBN: 9781260474312

Fully updated computer security essentials--mapped to the CompTIA Security+ SY0-601 exam

Save 10% on any CompTIA exam voucher! Coupon code inside.

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-601. This thoroughly revised, full-color textbook covers how to secure hardware, systems, and software. It addresses new threats and cloud environments, and provides additional coverage of governance, risk, compliance, and much more. Written by a team of highly respected security educators, Principles of Computer Security: CompTIA Security+(tm) and Beyond, Sixth Edition (Exam SY0-601) will help you become a CompTIA-certified computer security expert while also preparing you for a successful career.

Find out how to:

  • Ensure operational, organizational, and physical security
  • Use cryptography and public key infrastructures (PKIs)
  • Secure remote access, wireless networks, and virtual private networks (VPNs)
  • Authenticate users and lock down mobile devices
  • Harden network devices, operating systems, and applications
  • Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing
  • Combat viruses, worms, Trojan horses, and rootkits
  • Manage e-mail, instant messaging, and web security
  • Explore secure software development requirements
  • Implement disaster recovery and business continuity measures
  • Handle computer forensics and incident response
  • Understand legal, ethical, and privacy issues
Online content features:
  • Test engine that provides full-length practice exams and customized quizzes by chapter or exam objective
Each chapter includes:
  • Learning objectives
  • Real-world examples
  • Try This! and Cross Check exercises
  • Tech Tips, Notes, and Warnings
  • Exam Tips
  • End-of-chapter quizzes and lab projects
Note: the answers to the end of chapter sections are not printed in the book and are only available to adopting instructors. See your McGraw Hill sales representative for more information.

Foreword Preface Introduction Instructor Website
Chapter 1 Introduction and Security Trends The Computer Security Problem Threats to Security Attributes of Actors Security Trends Targets and Attacks Approaches to Computer Security Ethics Additional References
Chapter 1 Review
Chapter 2 General Security Concepts Basic Security Terminology Formal Security Models Additional References
Chapter 2 Review
Chapter 3 Operational and Organizational Security Policies, Procedures, Standards, and Guidelines Organizational Policies Security Policies Human Resources Policies Security Awareness and Training Standard Operating Procedures Third-Party Risk Management Interoperability Agreements
Chapter 3 Review
Chapter 4 The Role of People in Security People--A Security Problem Tools Attacks Poor Security Practices People as a Security Tool
Chapter 4 Review
Chapter 5 Cryptography Cryptography in Practice Cryptographic Objectives Historical Perspectives Hashing Functions Symmetric Encryption Asymmetric Encryption Quantum Cryptography Post-Quantum Lightweight Cryptography Homomorphic Encryption For More Information
Chapter 5 Review
Chapter 6 Applied Cryptography Cryptography Use Cipher Suites S/MIME PGP Steganography Secure Protocols Secure Protocol Use Cases Cryptographic Attacks Other Standards
Chapter 6 Review
Chapter 7 Public Key Infrastructure The Basics of Public Key Infrastructures Certificate Authorities Trust Models Digital Certificates Certificate Lifecycles Certificate Repositories Centralized and Decentralized Infrastructures Certificate-Based Threats PKIX and PKCS ISAKMP CMP XKMS CEP
Chapter 7 Review
Chapter 8 Physical Security The Security Problem Physical Security Safeguards Environmental Controls Fire Suppression Electromagnetic Environment Power Protection Drones/UAVs
Chapter 8 Review
Chapter 9 Network Fundamentals Network Architectures Network Topology Segregation/Segmentation/Isolation Security Zones Network Protocols Internet Protocol IPv4 vs. IPv6 Packet Delivery Inter-Networking MPLS Software-Defined Networking (SDN) Quality of Service (QoS) Traffic Engineering Route Security For More Information
Chapter 9 Review
Chapter 10 Infrastructure Security Devices Virtualization Networking Security Devices Security Device/Technology Placement Tunneling/VPN Storage Area Networks Media Removable Media Security Concerns for Transmission Media Physical Security Concerns
Chapter 10 Review
Chapter 11 Authentication and Remote Access User, Group, and Role Management Account Policies Authorization Identity Authentication Methods Biometric Factors Biometric Efficacy Rates Multifactor Authentication Remote Access Preventing Data Loss or Theft Database Security Cloud vs. On-premises Requirements Connection Summary For More Information
Chapter 11 Review
Chapter 12 Wireless Security and Mobile Devices Connection Methods and Receivers Wireless Protocols Wireless Systems Configuration Wireless Attacks Mobile Device Management Concepts Mobile Application Security Mobile Devices Policies for Enforcement and Monitoring Deployment Models
Chapter 12 Review
Chapter 13 Intrusion Detection Systems and Network Security History of Intrusion Detection Systems IDS Overview Network-Based IDSs Host-Based IDSs Intrusion Prevention Systems Network Security Monitoring Deception and Disruption Technologies Analytics SIEM DLP Tools Indicators of Compromise For More Information
Chapter 13 Review
Chapter 14 System Hardening and Baselines Overview of Baselines Hardware/Firmware Security Operating System and Network Operating System Hardening Secure Baseline Endpoint Protection Network Hardening Application Hardening Data-Based Security Controls Environment Automation/Scripting Alternative Environments Industry-Standard Frameworks and Reference Architectures Benchmarks/Secure Configuration Guides For More Information
Chapter 14 Review
Chapter 15 Types of Attacks and Malicious Software Avenues of Attack Malicious Code Malware Attacking Computer Systems and Networks Advanced Persistent Threat Password Attacks
Chapter 15 Review
Chapter 16 Security Tools and Techniques Network Reconnaissance and Discovery Tools File Manipulation Tools Shell and Script Environments Packet Capture and Replay Tools Forensic Tools Tool Suites Penetration Testing Vulnerability Testing Auditing Vulnerabilities
Chapter 16 Review
Chapter 17 Web Components, E-mail, and Instant Messaging
De oplyste priser er inkl. moms

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Trykt eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.