rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780782140842

CIWTM: Security Professional Study Guide: Exam 1D0-470

by ; ;
  • ISBN13:

    9780782140842

  • ISBN10:

    078214084X

  • Edition: CD
  • Format: Hardcover
  • Copyright: 2002-06-01
  • Publisher: Sybex
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $59.99
We're Sorry.
No Options Available at This Time.

Summary

Here's the book you need to prepare for Exam 1D0-470, CIW Security Professional. This Study Guide provides: In-depth coverage of official exam objectives Practical information on security concepts and practices Hundreds of challenging review questions, in the book and on the CD Leading-edge exam preparation software, including a testing engine and electronic flashcards Authoritative coverage of all exam topics, including: Implementing internetworking encryption and encryption methods Analyzing firewall types and firewall terminology Planning security systems and incorporating multiple levels of protection Securing mechanisms and parameters for Windows and UNIX Analyzing router security, threat containment, and intrusion detection Implementing intrusion-detection systems in an enterprise environment Installing operating system add-ons for personal firewalls and native auditing SSH Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Table of Contents

Introduction xxiii
Assessment Test xxxiii
What Is Security?
1(54)
Applied Encryption
55(52)
Types of Attacks
107(48)
General Security Principles
155(38)
Firewalls Roles and Types
193(50)
Firewall Topologies and Virtual Private Networks
243(38)
Detecting and Distracting Hackers
281(34)
Operating System Security
315(36)
File System Security
351(38)
Assessing and Reducing Risk
389(44)
The Auditing Process
433(48)
Auditing Penetration and Control Strategies
481(34)
Intrusion Detection
515(40)
Auditing and Log Analysis
555(40)
Recommending Solutions and Generating Reports
595(46)
Appendix A Sample Security Audit Report 641(8)
Appendix B A Sample Enterprise Scanner Report 649(8)
Appendix C Internet Security Resources 657(4)
Glossary 661(34)
Index 695

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program