CompTIA security+ guide to network security fundamentals / Mark Ciampa.
By: Ciampa, Mark D [author.].
Contributor(s): Computing Technology Industry Association [sponsoring body.].
Publisher: Boston [Mass.] Cengage Learning, ©2022Copyright date: ©2022Edition: Sixth edition.Description: xxvi, 756 pages : illustrations (chiefly color) ; 23 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9780357424377.Other title: Computing Technology Industry Association security+ guide to network security fundamentals | Security+ guide to network security fundamentals.Subject(s): Computer networks -- Security measures -- Examinations -- Study guides | Data protectionGenre/Form: Study guides. | Print books.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | TK5105.59 .C52 2022 (Browse shelf) | Available | AU00000000019174 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
TK5105.59 .C364 2019 Cyber security : threats and responses for government and business / | TK5105.59 .C37 2020 Tribe of hackers blue team : tribal knowledge from the best in defensive cybersecurity / | TK5105.59 .C388 2018 CCNA Cybersecurity Operations : Companion Guide / | TK5105.59 .C52 2022 CompTIA security+ guide to network security fundamentals / | TK5105.59 .C57 2020 CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide | TK5105.59 .C57 2021 Cisco cyberops associate (CBROPS) 200-201 official cert guide / | TK5105.59 .C57 2021 CCNP and CCIE collaboration core CLCOR 350-801 official cert guide / |
Includes bibliographical references and index.
Part 1: Security and its threats -- 1. Introduction to security. -- 2. Malware and social engineering attacks. -- Part 2: Cryptography -- 3. Basic cryptography. -- 4. Advanced cryptography and PKI. -- Part 3: Network attacks and defenses. -- 5. Networking and server attacks. -- 6. Network security devices, design and technologies. -- 7. Administering a secure network. -- 8. Wireless network security. -- Part 4: Device security -- 9. Client and application security.10. Mobile and embedded device security. -- Part 5: Identity and access management. -- 11. Authentication and account management -- 12. Access management. -- Part 6: Risk management. -- 13. Vulnerability assessment and data security. -- 14. Business continuity. -- 15. Risk mitigation.