Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
 Search:   
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
 
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
I.T
 .NET
 Windows 8
 Adobe CS6
 Cisco
 CCNA 2012
 CCNP 2012
 Java
 VB
 ASP
 Web Design
 E-Commerce
 Project Management
 ITIL
 Macintosh
 Mobile Devices
 Linux
 Windows Server 2012
 SQL Server 2012
 SAP
Certification
 MCITP
 MCTS
Economics and Business
 Accounting
 Business Information Systems
 Economics
 Finance
 Management
 Marketing
 TAX
 Human Resources
Academic
 Law
 Nursing
 Medical
 Psychology
 Engineering

Security+ Guide to Network Security Fundamentals, 3rd Edition

by: Mark Ciampa

On-line Price: $79.95 (includes GST)

Paperback package 640

41%Off Retail Price

You save: $55.00

CLEARANCE Item - Special discount -limited stock
_____________________
N.Sydney : In Stock

Retail Price: $134.95

Publisher: COURSE TECHNOLOGY,11.11.08

Category: TAFE I.T/Computing Level:

ISBN: 1428340661
ISBN13: 9781428340664

Add to Shopping Cart

PRESCRIBED TEXT AT LIDCOMBE TAFE, SEMESTER 2 2013

Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

# Virtual attack-and-defend computer labs allow readers to set up and connect multiple virtual computers within a single computer for hands-on experience with defending against network attacks.
# 'Today's Attacks and Defenses' open each chapter, highlighting real-life descriptions of some of the most current trends in attacks and defenses.
# Companion website offers updated security labs, newsfeeds, security blogs, videos and other supplemental resources.
# Numerous illustrations of security vulnerabilities, attacks, and defenses help readers visualize security elements, theories, and concepts.
# Hands-on projects are provided in each chapter to provide practical security software and hardware implementation experience, covering Microsoft Windows Vista and Linux operating systems, as well as software downloaded from the Internet.
# Two new lab manuals, one using Microsoft Windows Vista and Microsoft Windows Server 2008 and one based on virtualization, offer additional resources and opportunities for learning.

Ciampa,

Mark - Western Kentucky University
Mark Ciampa is an Assistant Professor of Computer Information Systems at Western Kentucky University in Bowling Green, Kentucky and is a PhD student at Indiana State University in Digital Communications. Prior to this he was an Associate Professor and the Director of Academic Computing at Volunteer State Community College in Gallatin, Tennessee. Mark has worked in the IT industry as a computer consultant for the U.S. Postal Service, the Tennessee Municipal Technical Advisory Service, and the University of Tennessee, and has taught in higher education for over 25 years. He is the author of several Course Technology books, including Security Awareness: Applying Practical Security In Your World 2ed, CWNA Guide to Wireless LANs 2ed, Wireless# Guide to Wireless Communications 2ed, and CWSP Guide to Wireless Security.

1. Introduction to Security.
SYSTEMS SECURITY.
2. System Threats and Risks.
3. Protecting Systems.
NETWORK SECURITY.
4. Network Vulnerabilities and Attacks.
5. Network Defenses.
6. Wireless Network Security.
ACCESS CONTROL.
7. Access Control Fundamentals.
8. Authentication.
ASSESSMENTS AND AUDITS.
9. Performing Vulnerability Assessments.
10. Conducting Audits.
CRYPTOGRAPHY .
11. Basic Cryptography.
12. Cryptographic Protocols and Public Key Infrastructure.
ORGANIZATIONAL SECURITY.
13. Business Continuity Planning and Procedures.
14. Policies and Legislation.