Start Over Please hold this item Export MARC Display Return To Browse
 
     
Limit search to available items
Record: Previous Record Next Record
Title Principles of computer security [electronic resource] : CompTIA security+ and beyond (exam SY0-301) / Wm. Arthur Conklin ... [et al.].
Publication Info New York : McGraw-Hill, c2012.
Edition 3rd ed.



Descript xxxi, 714 p. : ill. (some col.)
Edition 3rd ed.
Contents Chapter 1: Introduction and Security Trends Chapter 2: General Security Concepts Chapter 3: Operational/Organizational Security Chapter 4: The Role of People in Security Chapter 5: Cryptography Chapter 6: Public Key Infrastructure Chapter 7: Standards and Protocols Chapter 8: Physical Security Chapter 9: Network Fundamentals Chapter 10: Infrastructure Security Chapter 11: Authentication and Remote Access Chapter 12: Wireless Chapter 13: Intrusion Detection Systems and Network Security Chapter 14: Baselines Chapter 15: Types of Attacks and Malicious Software Chapter 16: E-mail and Instant Messaging Chapter 17: Web Components Chapter 18: Secure Software Development Chapter 19: Disaster Recovery, Business Continuity, and Organizational Policies Chapter 20: Risk Management Chapter 21: Change Management Chapter 22: Privilege Management Chapter 23: Computer Forensics Chapter 24: Legal Issues and Ethics Chapter 25: Privacy Appendix A: Objective Map Appendix B: About the CD Glossary Index
Note 200 annual accesses. UkHlHU
ISBN 9780071786157 (e-book)
Click on the terms below to find similar items in the catalogue
Subject Electronic data processing personnel -- Certification.
Computer networks -- Examinations -- Study guides.
Computer technicians -- Certification -- Study guides.
Alt author Conklin, Wm. Arthur (William Arthur)
Descript xxxi, 714 p. : ill. (some col.)
Edition 3rd ed.
Contents Chapter 1: Introduction and Security Trends Chapter 2: General Security Concepts Chapter 3: Operational/Organizational Security Chapter 4: The Role of People in Security Chapter 5: Cryptography Chapter 6: Public Key Infrastructure Chapter 7: Standards and Protocols Chapter 8: Physical Security Chapter 9: Network Fundamentals Chapter 10: Infrastructure Security Chapter 11: Authentication and Remote Access Chapter 12: Wireless Chapter 13: Intrusion Detection Systems and Network Security Chapter 14: Baselines Chapter 15: Types of Attacks and Malicious Software Chapter 16: E-mail and Instant Messaging Chapter 17: Web Components Chapter 18: Secure Software Development Chapter 19: Disaster Recovery, Business Continuity, and Organizational Policies Chapter 20: Risk Management Chapter 21: Change Management Chapter 22: Privilege Management Chapter 23: Computer Forensics Chapter 24: Legal Issues and Ethics Chapter 25: Privacy Appendix A: Objective Map Appendix B: About the CD Glossary Index
Note 200 annual accesses. UkHlHU
ISBN 9780071786157 (e-book)
Subject Electronic data processing personnel -- Certification.
Computer networks -- Examinations -- Study guides.
Computer technicians -- Certification -- Study guides.
Alt author Conklin, Wm. Arthur (William Arthur)

Subject Electronic data processing personnel -- Certification.
Computer networks -- Examinations -- Study guides.
Computer technicians -- Certification -- Study guides.
Descript xxxi, 714 p. : ill. (some col.)
Contents Chapter 1: Introduction and Security Trends Chapter 2: General Security Concepts Chapter 3: Operational/Organizational Security Chapter 4: The Role of People in Security Chapter 5: Cryptography Chapter 6: Public Key Infrastructure Chapter 7: Standards and Protocols Chapter 8: Physical Security Chapter 9: Network Fundamentals Chapter 10: Infrastructure Security Chapter 11: Authentication and Remote Access Chapter 12: Wireless Chapter 13: Intrusion Detection Systems and Network Security Chapter 14: Baselines Chapter 15: Types of Attacks and Malicious Software Chapter 16: E-mail and Instant Messaging Chapter 17: Web Components Chapter 18: Secure Software Development Chapter 19: Disaster Recovery, Business Continuity, and Organizational Policies Chapter 20: Risk Management Chapter 21: Change Management Chapter 22: Privilege Management Chapter 23: Computer Forensics Chapter 24: Legal Issues and Ethics Chapter 25: Privacy Appendix A: Objective Map Appendix B: About the CD Glossary Index
Note 200 annual accesses. UkHlHU
Alt author Conklin, Wm. Arthur (William Arthur)
ISBN 9780071786157 (e-book)

Links and services for this item: