The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Written by leaders in the field of IT security higher education, the new edition of this full-color text is revised to cover the 2011 CompTIA Security+ exam. Principles of Computer Security, Third Editioncovers the new 2011 CompTIA Security+ exam objectives and provides context for students and aspiring government workers looking to meet government workforce requirements (DOD 8570). This full-color textbook provides comprehensive coverage of the core principles of information security: system security, network infrastructure, access control, organizational security, and compliance, while also providing 100% coverage of all exam objectives for the CompTIA Security+ certification. The full-color textbook design is well illustrated with photographs and diagrams, and has an engaging, dynamic presentation. The textbook's teaching elements include sidebar questions, critical-skill building activities, and end-of-chapter student review and assessment. The textbook comes with a student CD-ROM that provides self-assessment software with two complete practice exams and a segment of CompTIA Security+ video training from LearnKey. Principles of Computer Security, Third Edition Features CompTIA Approved Quality CurriculumCAQC Official content Offers Online Learning Center with: instructor manual, classroom PowerPoint slides, and a test bank solution in EZ Test & Blackboard format Includes student CD-ROM with two complete practice exams and a segment of CompTIA Security+ video training from LearnKey Coverage includes: Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy
Table of Contents
Chapter 1: Introduction and Security Trends Chapter 2: General Security Concepts Chapter 3: Operational/Organizational Security Chapter 4: The Role of People in Security Chapter 5: Cryptography Chapter 6: Public Key Infrastructure Chapter 7: Standards and Protocols Chapter 8: Physical Security Chapter 9: Network Fundamentals Chapter 10: Infrastructure Security Chapter 11: Authentication and Remote Access Chapter 12: Wireless Chapter 13: Intrusion Detection Systems and Network Security Chapter 14: Baselines Chapter 15: Types of Attacks and Malicious Software Chapter 16: E-mail and Instant Messaging Chapter 17: Web Components Chapter 18: Secure Software Development Chapter 19: Disaster Recovery, Business Continuity, and Organizational Policies Chapter 20: Risk Management Chapter 21: Change Management Chapter 22: Privilege Management Chapter 23: Computer Forensics Chapter 24: Legal Issues and Ethics Chapter 25: Privacy Appendix A: Objective Map Appendix B: About the CD Glossary Index