Security+ Guide to Network Security Fundamentals, 3rd Edition
|Customers who bought this, also bought:|
|SUSE Linux Enterprise Server Administration (Course 3037) (Paperback)|
|MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced , 70-291 - **OUT OF PRINT. THERE IS A NEWER EDITION AVAILABLE. FOR 'MCSA Guide to Administering Microsoft Windows Server 2012/R2, Exam 70-411' PLEASE PERFORM A NEW SEARCH USING THE F|
|Understanding Australian Industrial Relations, 7th Edition - OUT OF PRINT. PLEASE CONTACT BOOKWARE CUSTOMER SERVICE FOR AVAILABILITY INFORMATION.|
|Wireless# Guide to Wireless Communications, 2nd Edition|
|Lab Manual for Security+ Guide to Networking Security Fundamentals, Second (2nd) Edition|
|Information Technology Project Management (with Microsoft Project 2007 CD-ROM) (This title will substitute for ISBN 9781111221751]|
|CCNA: Cisco® Certified Network Associate Study Guide, 6th Edition (Exam 640-802, Includes CD-ROM)|
|Foundations Of Management, 3rd Edition|
|Routing Protocols and concepts, CCNA exploration labs and study guide - 2nd Edition|
|Cisco Networking Academy Program CCNA 3 and 4 Lab Companion, Third (3rd) Edition|
$79.95 (includes GST)
Paperback package 640
41%Off Retail Price
CLEARANCE Item - Special discount - limited stock!
N.Sydney : In Stock
TAFE I.T/Computing Level:
| Add to Shopping Cart
PRESCRIBED TEXT AT LIDCOMBE TAFE, SEMESTER 2 2013
Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.
# Virtual attack-and-defend computer labs allow readers to set up and connect multiple virtual computers within a single computer for hands-on experience with defending against network attacks.
# 'Today's Attacks and Defenses' open each chapter, highlighting real-life descriptions of some of the most current trends in attacks and defenses.
# Companion website offers updated security labs, newsfeeds, security blogs, videos and other supplemental resources.
# Numerous illustrations of security vulnerabilities, attacks, and defenses help readers visualize security elements, theories, and concepts.
# Hands-on projects are provided in each chapter to provide practical security software and hardware implementation experience, covering Microsoft Windows Vista and Linux operating systems, as well as software downloaded from the Internet.
# Two new lab manuals, one using Microsoft Windows Vista and Microsoft Windows Server 2008 and one based on virtualization, offer additional resources and opportunities for learning.
Mark - Western Kentucky University
Mark Ciampa is an Assistant Professor of Computer Information Systems at Western Kentucky University in Bowling Green, Kentucky and is a PhD student at Indiana State University in Digital Communications. Prior to this he was an Associate Professor and the Director of Academic Computing at Volunteer State Community College in Gallatin, Tennessee. Mark has worked in the IT industry as a computer consultant for the U.S. Postal Service, the Tennessee Municipal Technical Advisory Service, and the University of Tennessee, and has taught in higher education for over 25 years. He is the author of several Course Technology books, including Security Awareness: Applying Practical Security In Your World 2ed, CWNA Guide to Wireless LANs 2ed, Wireless# Guide to Wireless Communications 2ed, and CWSP Guide to Wireless Security.
1. Introduction to Security.
2. System Threats and Risks.
3. Protecting Systems.
4. Network Vulnerabilities and Attacks.
5. Network Defenses.
6. Wireless Network Security.
7. Access Control Fundamentals.
ASSESSMENTS AND AUDITS.
9. Performing Vulnerability Assessments.
10. Conducting Audits.
11. Basic Cryptography.
12. Cryptographic Protocols and Public Key Infrastructure.
13. Business Continuity Planning and Procedures.
14. Policies and Legislation.