CompTIA Security+ All-in-One Exam Guide, Second Edition
暂无分享,去创建一个
A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One
Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the CompTIA Security+ exam with ease, this definitive volume also serves as an essential on-the-job reference. Get full details on all exam topics, including how to:
Combat viruses, Trojan horses, spyware, logic bombs, and worms
Defend against DDoS, spoofing, replay, TCP/IP hijacking, and other attacks
Apply best practices for access control methods
Implement authentication using Kerberos, CHAP, biometrics, and other methods
Use cryptography and PKI
Secure remote access, wireless, and virtual private networks (VPNs)
Harden networks, operating systems, and applications
Manage incident response and follow forensic procedures
The CD-ROM features
One full practice exam
Complete electronic book
Table of contents
Part I: Security Concepts
Chapter 1. General Security Concepts
Chapter 2. Operational Organizational Security
Chapter 3. Legal Issues, Privacy, and Ethics
Part II: Cryptography and Applications
Chapter 4. Cryptography
Chapter 5. Public Key Infrastructure
Chapter 6. Standards and Protocols
Part III: Security in the Infrastructure
Chapter 7. Physical Security
Chapter 8. Infrastructure Security
Chapter 9. Authentication and Remote Access
Chapter 10. Wireless Security
Part IV: Security in Transmissions
Chapter 11. Intrusion Detection Systems
Chapter 12. Security Baselines
Chapter 13. Types of Attacks and Malicious Software
Chapter 14. E-Mail and Instant Messaging
Chapter 15. Web Components
Part V: Operational Security
Chapter 16. Disaster Recovery and Business Continuity
Chapter 17. Risk Management
Chapter 18. Change Management
Chapter 19. Privilege Management
Chapter 20. Computer Forensics
Part VI: Appendixes
Appendix A. About the CD
Appendix B. OSI Model and Internet Protocols
Glossary
Index