Questions About This Book?
- The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
- The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.
Table of Contents
Chapter 1 Understanding Core Security Principles.
Chapter 2 Understanding Malware and Social Engineering.
Chapter 3 Understanding User Authentication.
Chapter 4 Securing Access with Permissions.
Chapter 5 Using Audit Policies and Network Auditing.
Chapter 6 Protecting Clients and Servers.
Chapter 7 Protecting a Network.
Chapter 8 Understanding Wireless Security.
Chapter 9 Understanding Physical Security.
Chapter 10 Enforcing Confidentiality with Encryption.
Chapter 11 Understanding Certificates and a PKI.
Chapter 12 Understanding Internet Explorer Security.
Appendix A Answers to Review Questions.
Appendix B Microsoft's Certification Program.