More New and Used
from Private Sellers
Usually Ships in 2-3 Business Days
Questions About This Book?
What version or edition is this?
This is the 2nd edition with a publication date of 12/19/2008.
What is included with this book?
- The Used copy of this book is not guaranteed to inclue any supplemental materials. Typically, only the book itself is included.
A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One - Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the CompTIA Security+ exam with ease, this definitive volume also serves as an essential on-the-job reference. Get full details on all exam topics, including how to: Combat viruses, Trojan horses, spyware, logic bombs, and worms * Defend against DDoS, spoofing, replay, TCP/IP hijacking, and other attacks * Apply best practices for access control methods * Implement authentication using Kerberos, CHAP, biometrics, and other methods * Use cryptography and PKI * Secure remote access, wireless, and virtual private networks (VPNs) * Harden networks, operating systems, and applications Manage incident response and follow forensic procedures. The CD-ROM features One full practice exam; Complete electronic book.
Greg White (San Antonio, TX), Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA, and was the author of the first edition of the Security+ All-in-One Exam Guide from McGraw-Hill.Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklin’s interests are information security, systems theory, and secure software design.
Table of Contents
|General Security Concepts|
|Operational Organizational Security|
|Legal Issues, Privacy, and Ethics|
|Cryptography and Applications|
|Public Key Infrastructure|
|Standards and Protocols|
|Security in the Infrastructure|
|Authentication and Remote Access|
|Security in Transmissions|
|Intrusion Detection Systems|
|Types of Attacks and Malicious Software|
|E-Mail and Instant Messaging|
|Disaster Recovery and Business Continuity|
|About the CD|
|OSI Model and Internet Protocols|
|Table of Contents provided by Publisher. All Rights Reserved.|