Security+ Guide to Network Security Fundamentals

  • ISBN13:


  • ISBN10:


  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2008-11-11
  • Publisher: Course Technology
  • View Upgraded Edition

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
  • eCampus.com Device Compatibility Matrix

    Click the device icon to install or view instructions

    Apple iOS | iPad, iPhone, iPod
    Android Devices | Android Tables & Phones OS 2.2 or higher | *Kindle Fire
    Windows 10 / 8 / 7 / Vista / XP
    Mac OS X | **iMac / Macbook
    Enjoy offline reading with these devices
    Apple Devices
    Android Devices
    Windows Devices
    Mac Devices
    iPad, iPhone, iPod
    Our reader is compatible
    Android 2.2 +
    Our reader is compatible
    Kindle Fire
    Our reader is compatible
    10 / 8 / 7 / Vista / XP
    Our reader is compatible
    Our reader is compatible
List Price: $266.99 Save up to $265.99
  • Rent Book $4.99
    Add to Cart Free Shipping


    7-Day eTextbook Access 7-Day eTextbook Access


Supplemental Materials

What is included with this book?

  • The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Table of Contents

Introduction to Security
Challenges of Securing Information
Today+s security attacks
Difficulties in defending against attacks
What Is Information Security?
Defining information security
Information security terminology
Understanding the importance of information security
Preventing data theft
Thwarting Identity Theft
Avoiding legal consequences
Maintaining Productivity
Foiling Cyberterrorism
Who Are the Attackers?
Script Kiddies
Attacks and Defenses
Steps of an attack
Defenses against attacks
Surveying Information Security Careers and the CompTIA Security+ Certification
System Threats and Risks
Software-Based Attacks {1.1)
Infecting Malware
Viruses (1.1)
Worms (1.1)
Concealing Malware
Trojan Horses (1.1)
Rootkits (1.1)
Logic Bombs (1.1)
Privilege escalation (1.1)
Profiting Malware
Spam (1.1)
Spyware (1.1)
Adware (1.1)
Botnets (1.1)
Hardware Attacks {1.2}
BIOS (1.2)
USB devices (1.2)
Removable storage (1.2)
Network attached storage (1.2)
Cell phones (1.2)
Attacks on Virtualized Systems (1.6)
What is virtualization?
Attacks on virtual systems
Protecting Systems
Hardening the Operating System {1.3}
Managing operating system updates
Hot fixes (1.3)
Service packs (1.3)
Patches (1.3)
Patch management techniques (1.3)
Protecting the operating system through procedures
Group policies (1.3)
Security templates (1.3)
Configuration baselines (1.3)
Managing Application Security
Protecting the web browser (1.4)
ActiveX (1.4)
Java (1.4)
Scripting (1.4)
Cookies (1.4)
Input validation (1.4)
Cross-site scripting (1.4)
Protecting communication applications
Buffer overflows (1.4)
SMTP open relays (1.4)
Instant messaging (1.4)
P2P (1.4)
Applying System Security Applications
Host Intrusion Detection Systems (HIDS) (1.5)
Personal software firewalls (1.5)
Antivirus (1.5) iv. Anti-Spam (1.5) v. Popup blockers (1.5) NETWORK SECURITY
Network Vulnerabilities and Attacks
Liabilities in Networks
Media Liabilities
Vampire taps (2.6)
Cable placement
Wireless Network Liabilities
Data emanation (2.7)
SSID broadcast (2.7)
Weak encryption (2.7)
Attacks on Networks
Protocol-based attacks {2.1}
Antiquated protocols (2.1)
DNS poisoning (2.1)
ARP Poisoning (2.1)
Impersonation attacks
TCP/IP hijacking (2.1)
Spoofing (2.1)
Man in the middle (2.1)
Replay (2.1)
Wireless attacks
War driving (2.7)
Blue jacking (2.7)
Blue snarfing (2.7)
Rogue access points (2.7) iv. Other attacks {2.1}
Null sessions (2.1)
DOS (2.1)
DDOS (2.1)
Kiting (2.1)
Network Defenses
Creating a Secure Network
Security through network technologies
Network Address Translation (NAT) (2.2)
Network Access Control (NAC) (2.2)
Security through network design
Demilitarized zones (DMZ) (2.2)
Virtual LAN (VLAN) (2.2)
Virtual private network
Subnetting (2.2)
Network interconnections (2.2)
Convergence [? CompTIA has +Telephony+] (2.2)
Network Device Vulnerabilities {2.5}
Privilege escalation (2.5)
Weak passwords (2.5)
Back doors (2.5)
Table of Contents provided by Publisher. All Rights Reserved.

Rewards Program

Write a Review