• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Eleventh Hour Security+: Exam SY0-201 Study Guide » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2948695]
• Literatura piękna
 [1824038]

  więcej...
• Turystyka
 [70868]
• Informatyka
 [151073]
• Komiksy
 [35227]
• Encyklopedie
 [23181]
• Dziecięca
 [621575]
• Hobby
 [138961]
• AudioBooki
 [1642]
• Literatura faktu
 [228651]
• Muzyka CD
 [371]
• Słowniki
 [2933]
• Inne
 [445341]
• Kalendarze
 [1243]
• Podręczniki
 [164416]
• Poradniki
 [479493]
• Religia
 [510449]
• Czasopisma
 [502]
• Sport
 [61384]
• Sztuka
 [243086]
• CD, DVD, Video
 [3417]
• Technologie
 [219673]
• Zdrowie
 [100865]
• Książkowe Klimaty
 [124]
• Zabawki
 [2168]
• Puzzle, gry
 [3372]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7838]
Kategorie szczegółowe BISAC

Eleventh Hour Security+: Exam SY0-201 Study Guide

ISBN-13: 9781597494274 / Angielski / Miękka / 2009 / 232 str.

Microsoft’s Communica Ido Dubrawsky (Chief Security Advisor
Eleventh Hour Security+: Exam SY0-201 Study Guide Ido Dubrawsky (Chief Security Advisor, Microsoft’s Communication Sector North America, a division of the Mobile and Embe 9781597494274 Syngress Media,U.S. - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Eleventh Hour Security+: Exam SY0-201 Study Guide

ISBN-13: 9781597494274 / Angielski / Miękka / 2009 / 232 str.

Microsoft’s Communica Ido Dubrawsky (Chief Security Advisor
cena 139,81
(netto: 133,15 VAT:  5%)

Najniższa cena z 30 dni: 85,59
Termin realizacji zamówienia:
ok. 16-18 dni roboczych.

Darmowa dostawa!

Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam.
The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; application security; virtualization technologies; network security; wireless networks; network access; network authentication; risk assessment and risk mitigation; general cryptographic concepts; public key infrastructure; redundancy planning; environmental controls and implementing disaster recovery and incident response procedures; and legislation and organizational policies.
Each chapter includes information on exam objectives, exam warnings, and the top five toughest questions along with their answers.

  • The only book keyed to the new SY0-201 objectives that has been crafted for last minute cramming
  • Easy to find, essential material with no fluff - this book does not talk about security in general, just how it applies to the test
  • Includes review of five toughest questions by topic - sure to improve your score

Kategorie:
Informatyka
Kategorie BISAC:
Computers > Security - General
Education > Distance, Open & Online Education
Wydawca:
Syngress Media,U.S.
Język:
Angielski
ISBN-13:
9781597494274
Rok wydania:
2009
Dostępne języki:
Angielski
Numer serii:
000397258
Ilość stron:
232
Waga:
0.49 kg
Wymiary:
23.523.5 x 19.1
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Bibliografia
Wydanie ilustrowane

About the Authors

Chapter 1 Systems Security

Systems security threats

Privilege escalation

Viruses and worms

Trojan

Spyware and adware

Rootkits and botnets

Logic bombs

Host intrusion detection system

Behavior-based vs. signature-based IDS characteristics

Anti-SPAM

Pop-up blockers

Hardware and peripheral security risks

BIOS

USB devices

Cell phones

Removable storage devices

Network attached storage

Summary of exam objectives

Top five toughest questions

Answers

Chapter 2 OS Hardening

General OS hardening

Services

File system

Removing unnecessary programs

Hotfixes/patches

Service packs/maintenance updates

Patch management

Windows group policies

Security templates

Configuration baselines

Server OS hardening

Enabling and disabling services and protocols

FTP servers

DNS servers

NNTP servers

File and print servers

DHCP servers

Data repositories

Workstation OS

User rights and groups

Summary of exam objectives

Top five toughest questions

Answers

Chapter 3 Application Security

Threats are moving "up the stack”

Rationale

Threat modeling

Application security threats

Browser

Buffer overflows

Packet sniffers and instant messaging

Instant messaging

Peer-to-peer

SMTP open relays

Summary of exam objectives

Top five toughest questions

Answers

Chapter 4 Virtualization Technologies

The purpose of virtualization

Benefits of virtualization

Types of virtualization

Designing a virtual environment

System virtualization

Management of virtual servers

Application virtualization

Application streaming

Summary of exam objectives

Top five toughest questions

Answers

Chapter 5 Network Security

General network security

Network services and risks associated with them

Network design elements

Network security tools

Network ports, services, and threats

Network ports and protocols

Network threats

Network design elements and components

Firewalls

What is a DMZ?

VLANs

Network address translation

Network access control/network access protection

Telephony

Network security tools

Intrusion detection and preventions systems

Honeypots

Content filters

Protocol analyzers

Summary of exam objectives

Top five toughest questions

Answers

Chapter 6 Wireless Networks

Wireless network design

Wireless communications

Spread spectrum technology

Wireless network architecture

CSMA/CD and CSMA/CA

Service set ID broadcast

Wireless security standards

The failure of WEP

WPA and WPA2

WAP

WTLS

Authentication

Rogue access points

Data emanation

Bluetooth

Summary of exam objectives

Top five toughest questions

Answers

References

Chapter 7 Network Access

General network access

Access control

Access control models

Authentication models and components

Identity

Access control methods and models

Separation of duties

Least privilege

Job rotation

Mandatory access control

Discretionary access control

Role- and rule-based access control

Access control organization

Security groups

Security controls

Logical access control methods

Access control lists

Group policies

Domain policies

Time of day restrictions

Account expiration

Logical tokens

Physical access security methods

Access lists and logs

Hardware locks

ID badges

Door access systems

Man-trap

Video surveillance

Summary of exam objectives

Top five toughest questions

Answers

Chapter 8 Network Authentication

Authentication methods

Access control

Authentication

Auditing

Authentication methods

One-factor

Two-factor

Three-factor

Single sign-on

Authentication systems

Remote access policies and authentication

Biometrics

Summary of exam objectives

Top five toughest questions

Answers

Chapter 9 Risk Assessment and Risk Mitigation

Conduct risk assessments and implement risk mitigation

Vulnerability assessment tools

Password crackers

Network mapping tools

Use monitoring tools on systems and networks

Workstations

Intrusion detection systems

Logging and auditing

Auditing systems

System Logs

Performance Logs

Access Logs

Audits

Summary of exam objectives

Top five toughest questions

Answers

Chapter 10 General Cryptographic Concepts

General cryptography

Symmetric key cryptography

Asymmetric key cryptography

Hashes and applications

Digital signatures

Certificates

CIA-For all your security needs

Non-repudiation

Key management

Encryption algorithms

DES

3DES

RSA

AES

Elliptic curve cryptography

One-time pads

Transmission encryption

WEP

TKIP

Protocols

SSL/TLS

HTTP vs. HTTPS vs. SHTTP

Other protocols with TLS

S/MIME

SSH

IPSec

PPTP

L2TP

Cryptography in operating systems

File and folder encryption

E-mail

Whole disk encryption

Trusted platform module

Summary of exam objectives

Top five toughest questions

Answers

Chapter 11 Public Key Infrastructure

PKI overview

PKI encryption

PKI Standards

PKI solutions

Components of PKI

Digital certificates

Certification authority

Certificate revocation list

Recovery agents

Certificate authority

Certificate revocation list

Key escrow

Registration

Recovery agents

Implementation

Certificate management

Summary of exam objectives

Top five toughest questions

Answers

Chapter 12 Redundancy Planning

Alternate sites

Hot site

Warm site

Cold site

Redundant systems

Servers

Connections

ISP

RAID

Spare parts

Backup generator

UPS

Summary of exam objectives

Top five toughest questions

Answers

Chapter 13 Controls and Procedures

Environmental controls

Fire suppression

HVAC

Shielding

Implementing disaster recovery and incident response procedures

Disaster recovery

Incident response

Defending against social engineering

Summary of exam objectives

Top five toughest questions

Answers

Chapter 14 Legislation and Organizational Policies

Secure disposal of systems

Retention/storage

Destruction

Acceptable use policies

Password complexity

Strong passwords

Password changes and restrictions

Administrator accounts

Change management

Information classification

Vacations

Separation of duties

Personally identifiable information

Privacy

Due care

Due process

Due diligence

SLAs

User education and awareness training

Communication

User awareness

Education

Online resources

Security-related HR policies

Code of Ethics

Summary of exam objectives

Top five toughest questions

Answers

Index










Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia