Title:
Mike meyers' certification passport compTIA security+
Personal Author:
Edition:
2nd ed.
Publication Information:
New York : McGraw-Hil, 2009
Physical Description:
xxiv, 420 p. : ill. ; 23 cm.
ISBN:
9780071601238
General Note:
Accompanied by CD-ROM : CP 015575
Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010190872 | QA76.3 S25 2008 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
From the #1 Name in Professional Certification
Get on the fast track to becoming CompTIA Security+ certified with this affordable, portable study tool. Inside, network security expert T.J. Samuelle guides you on your career path, providing expert tips and sound advice along the way. With an intensive focus only on what you need to know to pass the CompTIA Security+ exam, this certification passport is your ticket to success on exam day.
Featuring:
Itineraries--List of official exam objectives covered ETAs--Amount of time needed to complete each lesson Travel Advisories--Expert advice on critical topics Local Lingo--Concise definitions of key terms and concepts Travel Assistance--Recommended resources for more information Exam Tips--Common exam pitfalls and solutions Checkpoints--End-of-chapter questions, answers, and explanations Career Flight Path--Career options mapped out to maximize the return from your IT journey Practice exam on CD powered by LearnKeyAuthor Notes
T.J. Samuelle, CompTIA Network+, CompTIA Server+, CompTIA Security+,is an IT consultant and author of several computer books on CompTIA certifications. He served as a subject matter expert for CompTIA on the Network+ and Security+ exams.
Table of Contents
Part 1 Systems Security |
Chapter 1 Security Threats and Risks |
Chapter 2 Hardware and Software Security |
Part 2 Network Infrastructure |
Chapter 3 Network Security |
Chapter 4 Network and Wireless Security Tools |
Part 3 Access Control |
Chapter 5 Access Control |
Chapter 6 Authentication |
Part 4 Security Assessments and Audits |
Chapter 7 Risk and Vulnerability Assessment |
Chapter 8 Monitoring and Auditing |
Part 5 Cryptography |
Chapter 9 Cryptography and Encryption Basics |
Chapter 10 Public Key Infrastructure |
Part 6 Organizational Security |
Chapter 11 Redundancy and Environmental Planning |
Chapter 12 Disaster Recovery and Incident Response |
Chapter 13 Organizational Policies and Procedures |
Part 7 Appendices |
Appendix A About the CD |
Appendix B Career Flightpath |