CompTIA Security+ 2008 In Depth

CompTIA Security+ 2008 In Depth

by Mark Ciampa, Alex Feher
     
 


"CompTIA Security+ 2008 In Depth" gives you the coverage you need to pass CompTIA's latest Security+ exam and to fully understand the current risks and threats to an organization's data. If you are just entering the IT field, you will appreciate the comprehensive coverage of the tools and techniques necessary to safeguard electronic data. You'll also learn… See more details below

Overview


"CompTIA Security+ 2008 In Depth" gives you the coverage you need to pass CompTIA's latest Security+ exam and to fully understand the current risks and threats to an organization's data. If you are just entering the IT field, you will appreciate the comprehensive coverage of the tools and techniques necessary to safeguard electronic data. You'll also learn everything you need to pass the Security+ exam and attain this increasingly valuable certification. All the domain objectives itemized by CompTIA in their Security+ exam are covered: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security.

Product Details

ISBN-13:
9781598638134
Publisher:
Cengage Learning
Publication date:
11/20/2008
Series:
In Depth Ser.
Edition description:
Older Edition
Pages:
444
Product dimensions:
7.30(w) x 9.10(h) x 1.20(d)

Table of Contents


Introduction; Chapter 1: Introduction to Security; Chapter 2: System Threats and Risks; Chapter 3: Protecting Systems; Chapter 4: Network Vulnerabilities and Attacks; Chapter 5: Network Defenses; Chapter 6: Wireless Network Security; Chapter 7: Access Control Fundamentals; Chapter 8: Authentication; Chapter 9: Performing Vulnerability Assessments; Chapter 10: Conducting Security Audits; Chapter 11: Basic Cryptography; Chapter 12: Applying Cryptography; Chapter 13: Business Continuity; Chapter 14: Security Policies and Training; Appendix A: CompTIA Security+ 2008 Examination Objectives Appendix B: Security Web Sites; Appendix C: Selected TCP/IP Ports and Their Threats; Appendix D: Sample Internet and E-Mail Acceptable Use Policy; Appendix E: Answers to Chapter Review Questions

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >