Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501)

  • 23h 54m
  • Chuck Cothren, Dwayne Williams, Gregory White, Roger Davis, Wm. Author Conklin
  • McGraw-Hill/Osborne
  • 2018

Fully updated computer security essentials—quality approved by CompTIA

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written by a pair of highly respected security educators, Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Exam SY0-501) will help you pass the exam and become a CompTIA certified computer security expert.

Find out how to:

  • Ensure operational, organizational, and physical security
  • Use cryptography and public key infrastructures (PKIs)
  • Secure remote access, wireless networks, and virtual private networks (VPNs)
  • Authenticate users and lock down mobile devices
  • Harden network devices, operating systems, and applications
  • Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing
  • Combat viruses, worms, Trojan horses, and rootkits
  • Manage e-mail, instant messaging, and web security
  • Explore secure software development requirements
  • Implement disaster recovery and business continuity measures
  • Handle computer forensics and incident response
  • Understand legal, ethical, and privacy issues

Each chapter includes:

  • Learning objectives
  • Real-world examples
  • Try This! and Cross Check exercises
  • Tech Tips, Notes, and Warnings
  • Exam Tips
  • End-of-chapter quizzes and lab projects

In this Book

  • About This Book
  • Foreword
  • Introduction
  • Instructor Web Site
  • Introduction and Security Trends
  • General Security Concepts
  • Operational and Organizational Security
  • The Role of People in Security
  • Cryptography
  • Applied Cryptography
  • Public Key Infrastructure
  • Physical Security
  • Network Fundamentals
  • Infrastructure Security
  • Authentication and Remote Access
  • Wireless Security and Mobile Devices
  • Intrusion Detection Systems and Network Security
  • System Hardening and Baselines
  • Types of Attacks and Malicious Software
  • E-Mail and Instant Messaging
  • Web Components
  • Secure Software Development
  • Business Continuity, Disaster Recovery, and Organizational Policies
  • Risk Management
  • Change Management
  • Incident Response
  • Computer Forensics
  • Legal Issues and Ethics
  • Privacy
  • Glossary
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.6 of 80 users Rating 4.6 of 80 users (80)