rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780764525995

Security+ Prep Guide

by ;
  • ISBN13:

    9780764525995

  • ISBN10:

    0764525999

  • Edition: CD
  • Format: Paperback
  • Copyright: 2003-02-01
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $60.00
We're Sorry.
No Options Available at This Time.

Summary

A complete study guide for the new Security+ certification exam, providing objective coverage, definitions, and sample test questions Security+ certification has been endorsed by Microsoft, IBM, Verisign, the Secret Service, and the FBI, and is expected to become a prerequisite for many vendor-specific certifications Written by the authors of the bestselling The CISSP Prep Guide (0-471-41356-9) and organized in the same user-focused format CD-ROM includes the Boson test engine, packed with review questions to prepare for the Security+ certification exam

Author Biography

RONALD L. KRUTZ, PhD, is Senior Information Security Consultant for Corbett Technologies and a lead instructor for the CISSP CBK review seminars. He&#8217;s a former faculty R&amp;D Director at Carnegie Mellon University Research Insti-tute, a CISSP, and coauthor of the bestselling The CISSP Prep Guide. <p> RUSSELL DEAN VINES is President of the RDVGroup, a New York&#8212;based security consulting services firm, a CISSP, and coauthor of the bestselling The CISSP Prep Guide. He is a frequent speaker on security methodology, wireless security, and best practices, and has helped design and build security architectures for Fortune 1000 companies worldwide.

Table of Contents

Acknowledgments.
Introduction.
Chapter 1: General Security Concepts.
Chapter 2: Communication Security.
Chapter 3: Infrastructure Security.
Chapter 4: Basics of Cryptography.
Chapter 5: Operational/Organizational Security.
Appendix A: Answers to Sample Questions.
Appendix B: Glossary of Terms and Acronyms.
Appendix C: Common Internet Vulnerabilities.
Appendix D: NMap Log.
Appendix E: What’s on the CD-ROM?
Index.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program