Principles of Computer Security CompTIA Security+ and Beyond (Exam SY0-301), Third Edition
Author | : Wm. Arthur Conklin |
Publisher | : McGraw Hill Professional |
Total Pages | : 750 |
Release | : 2012-01-26 |
ISBN-10 | : 9780071786157 |
ISBN-13 | : 0071786155 |
Rating | : 4/5 (57 Downloads) |
Download or read book Principles of Computer Security CompTIA Security+ and Beyond (Exam SY0-301), Third Edition written by Wm. Arthur Conklin and published by McGraw Hill Professional. This book was released on 2012-01-26 with total page 750 pages. Available in PDF, EPUB and Kindle. Book excerpt: Written by leaders in the field of IT security higher education, the new edition of this full-color text is revised to cover the 2011 CompTIA Security+ exam. Principles of Computer Security, Third Edition covers the new 2011 CompTIA Security+ exam objectives and provides context for students and aspiring government workers looking to meet government workforce requirements (DOD 8570). This full-color textbook provides comprehensive coverage of the core principles of information security: system security, network infrastructure, access control, organizational security, and compliance, while also providing 100% coverage of all exam objectives for the CompTIA Security+ certification. Well illustrated with photographs and diagrams, and has an engaging, dynamic presentation. The textbook’s teaching elements include sidebar questions, critical-skill building activities, and end-of-chapter student review and assessment. Principles of Computer Security, Third Edition Features CompTIA Approved Quality Curriculum—CAQC Official content Offers Online Learning Center with: instructor manual, classroom PowerPoint slides, and a test bank solution in EZ Test & Blackboard format Includes two complete practice exams Coverage includes: Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy