Record ID | ia:securityguideton0004ciam |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/securityguideton0004ciam/securityguideton0004ciam_marc.xml |
Download MARC binary | https://www.archive.org/download/securityguideton0004ciam/securityguideton0004ciam_meta.mrc |
LEADER: 02952cam 2200505 a 4500
001 ocn707969716
003 OCoLC
005 20200907052206.0
008 110603s2012 maua b 001 0 eng
010 $a 2011931202
040 $aDLC$beng$cDLC$dBTCTA$dTZF$dYDXCP$dCDX$dMNW$dOCLCF$dZ5F$dOCLCQ$dSWW
019 $a794992416
020 $a9781111640125
020 $a1111640122
020 $a9781111640170
020 $a1111640173
035 $a(OCoLC)707969716$z(OCoLC)794992416
042 $apcc
050 00 $aTK5105.59$b.C52 2012
082 00 $a005.8$223
100 1 $aCiampa, Mark D.
245 10 $aSecurity+ guide to network security fundamentals /$cMark Ciampa.
250 $a4th ed.
260 $aBoston, MA :$bCourse Technology, Cengage Learning,$c©2012.
300 $axxvi, 628 pages :$billustrations ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
500 $aIncludes index.
504 $aIncludes bibliographical references and index.
505 0 $aIntroduction to security -- Malware and social engineering attacks -- Application and network attacks -- Vulnerability assessment and mitigating attacks -- Host, application, and data security -- Network security -- Administering a secure network -- Wireless network security -- Access control fundamentals -- Authentication and account management -- Basic cryptography -- Advanced cryptography -- Business continuity -- Risk mitigation -- Appendix A: CompTIA SYO-301 certification exam objectives -- Appendix B: Downloads and tools for hands-on projects -- Appendix C: Security web sites -- Appendix D: Selected TCP/IP ports and their threats -- Appendix E: Sample internet and e-mail acceptable use policies -- Appendix F: Information security community site.
520 8 $aThis new edition provides up-to-date industry information, reflecting the changes in security that have occured since the most recent CompTIA Security+ objectives were created. It features many new topics such as SQL injection, rootkits and virtualization.
650 0 $aComputer networks$xSecurity measures$xExaminations$vStudy guides.
650 7 $aComputer networks$xSecurity measures$xExaminations.$2fast$0(OCoLC)fst00872343
655 7 $aStudy guides.$2fast$0(OCoLC)fst01423888
856 41 $3Table of contents$uhttp://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-t.html
856 42 $3Contributor biographical information$uhttp://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-b.html
856 42 $3Publisher description$uhttp://catdir.loc.gov/catdir/enhancements/fy1303/2011931202-d.html
938 $aBaker and Taylor$bBTCP$nBK0009702814
938 $aCoutts Information Services$bCOUT$n17510517$c139.95 USD
938 $aYBP Library Services$bYANK$n7145574
029 1 $aAU@$b000047901533
029 1 $aNZ1$b14023344
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 118 OTHER HOLDINGS