Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501)
- 23h 54m
- Chuck Cothren, Dwayne Williams, Gregory White, Roger Davis, Wm. Author Conklin
- McGraw-Hill/Osborne
- 2018
Fully updated computer security essentials—quality approved by CompTIA
Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written by a pair of highly respected security educators, Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501) will help you pass the exam and become a CompTIA certified computer security expert.
Find out how to:
- Ensure operational, organizational, and physical security
- Use cryptography and public key infrastructures (PKIs)
- Secure remote access, wireless networks, and virtual private networks (VPNs)
- Authenticate users and lock down mobile devices
- Harden network devices, operating systems, and applications
- Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing
- Combat viruses, worms, Trojan horses, and rootkits
- Manage e-mail, instant messaging, and web security
- Explore secure software development requirements
- Implement disaster recovery and business continuity measures
- Handle computer forensics and incident response
- Understand legal, ethical, and privacy issues
Each chapter includes:
- Learning objectives
- Real-world examples
- Try This! and Cross Check exercises
- Tech Tips, Notes, and Warnings
- Exam Tips
- End-of-chapter quizzes and lab projects
In this Book
-
About This Book
-
Foreword
-
Introduction
-
Instructor Web Site
-
Introduction and Security Trends
-
General Security Concepts
-
Operational and Organizational Security
-
The Role of People in Security
-
Cryptography
-
Applied Cryptography
-
Public Key Infrastructure
-
Physical Security
-
Network Fundamentals
-
Infrastructure Security
-
Authentication and Remote Access
-
Wireless Security and Mobile Devices
-
Intrusion Detection Systems and Network Security
-
System Hardening and Baselines
-
Types of Attacks and Malicious Software
-
E-Mail and Instant Messaging
-
Web Components
-
Secure Software Development
-
Business Continuity, Disaster Recovery, and Organizational Policies
-
Risk Management
-
Change Management
-
Incident Response
-
Computer Forensics
-
Legal Issues and Ethics
-
Privacy
-
Glossary
SHOW MORE
FREE ACCESS