(0) items

Security+ Guide to Network Security Fundamentals,9781428340664

Security+ Guide to Network Security Fundamentals



Pub. Date:
Cengage Learning
List Price: $190.33

Rent Textbook


Buy Used Textbook

In Stock Usually Ships in 24 Hours.


Downloadable Offline Access
  • Apple Devices
  • Android Devices
  • Windows Devices
  • Mac Devices


New Textbook

We're Sorry
Sold Out

More New and Used
from Private Sellers
Starting at $0.01
See Prices

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 3rd edition with a publication date of 11/11/2008.
What is included with this book?
  • The Used copy of this book is not guaranteed to inclue any supplemental materials. Typically, only the book itself is included.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.


Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Table of Contents

Introduction to Security
Challenges of Securing Information
Today+s security attacks
Difficulties in defending against attacks
What Is Information Security?
Defining information security
Information security terminology
Understanding the importance of information security
Preventing data theft
Thwarting Identity Theft
Avoiding legal consequences
Maintaining Productivity
Foiling Cyberterrorism
Who Are the Attackers?
Script Kiddies
Attacks and Defenses
Steps of an attack
Defenses against attacks
Surveying Information Security Careers and the CompTIA Security+ Certification
System Threats and Risks
Software-Based Attacks {1.1)
Infecting Malware
Viruses (1.1)
Worms (1.1)
Concealing Malware
Trojan Horses (1.1)
Rootkits (1.1)
Logic Bombs (1.1)
Privilege escalation (1.1)
Profiting Malware
Spam (1.1)
Spyware (1.1)
Adware (1.1)
Botnets (1.1)
Hardware Attacks {1.2}
BIOS (1.2)
USB devices (1.2)
Removable storage (1.2)
Network attached storage (1.2)
Cell phones (1.2)
Attacks on Virtualized Systems (1.6)
What is virtualization?
Attacks on virtual systems
Protecting Systems
Hardening the Operating System {1.3}
Managing operating system updates
Hot fixes (1.3)
Service packs (1.3)
Patches (1.3)
Patch management techniques (1.3)
Protecting the operating system through procedures
Group policies (1.3)
Security templates (1.3)
Configuration baselines (1.3)
Managing Application Security
Protecting the web browser (1.4)
ActiveX (1.4)
Java (1.4)
Scripting (1.4)
Cookies (1.4)
Input validation (1.4)
Cross-site scripting (1.4)
Protecting communication applications
Buffer overflows (1.4)
SMTP open relays (1.4)
Instant messaging (1.4)
P2P (1.4)
Applying System Security Applications
Host Intrusion Detection Systems (HIDS) (1.5)
Personal software firewalls (1.5)
Antivirus (1.5) iv. Anti-Spam (1.5) v. Popup blockers (1.5) NETWORK SECURITY
Network Vulnerabilities and Attacks
Liabilities in Networks
Media Liabilities
Vampire taps (2.6)
Cable placement
Wireless Network Liabilities
Data emanation (2.7)
SSID broadcast (2.7)
Weak encryption (2.7)
Attacks on Networks
Protocol-based attacks {2.1}
Antiquated protocols (2.1)
DNS poisoning (2.1)
ARP Poisoning (2.1)
Impersonation attacks
TCP/IP hijacking (2.1)
Spoofing (2.1)
Man in the middle (2.1)
Replay (2.1)
Wireless attacks
War driving (2.7)
Blue jacking (2.7)
Blue snarfing (2.7)
Rogue access points (2.7) iv. Other attacks {2.1}
Null sessions (2.1)
DOS (2.1)
DDOS (2.1)
Kiting (2.1)
Network Defenses
Creating a Secure Network
Security through network technologies
Network Address Translation (NAT) (2.2)
Network Access Control (NAC) (2.2)
Security through network design
Demilitarized zones (DMZ) (2.2)
Virtual LAN (VLAN) (2.2)
Virtual private network
Subnetting (2.2)
Network interconnections (2.2)
Convergence [? CompTIA has +Telephony+] (2.2)
Network Device Vulnerabilities {2.5}
Privilege escalation (2.5)
Weak passwords (2.5)
Back doors (2.5)
Table of Contents provided by Publisher. All Rights Reserved.

Please wait while the item is added to your cart...