Normal view MARC view ISBD view

CompTIA security+ guide to network security fundamentals / Mark Ciampa.

By: Ciampa, Mark D [author.].
Contributor(s): Computing Technology Industry Association [sponsoring body.].
Publisher: Boston [Mass.] Cengage Learning, ©2022Copyright date: ©2022Edition: Sixth edition.Description: xxvi, 756 pages : illustrations (chiefly color) ; 23 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9780357424377.Other title: Computing Technology Industry Association security+ guide to network security fundamentals | Security+ guide to network security fundamentals.Subject(s): Computer networks -- Security measures -- Examinations -- Study guides | Data protectionGenre/Form: Study guides. | Print books.
Contents:
Part 1: Security and its threats -- 1. Introduction to security. -- 2. Malware and social engineering attacks. -- Part 2: Cryptography -- 3. Basic cryptography. -- 4. Advanced cryptography and PKI. -- Part 3: Network attacks and defenses. -- 5. Networking and server attacks. -- 6. Network security devices, design and technologies. -- 7. Administering a secure network. -- 8. Wireless network security. -- Part 4: Device security -- 9. Client and application security.10. Mobile and embedded device security. -- Part 5: Identity and access management. -- 11. Authentication and account management -- 12. Access management. -- Part 6: Risk management. -- 13. Vulnerability assessment and data security. -- 14. Business continuity. -- 15. Risk mitigation.
    average rating: 0.0 (0 votes)

Includes bibliographical references and index.

Part 1: Security and its threats -- 1. Introduction to security. -- 2. Malware and social engineering attacks. -- Part 2: Cryptography -- 3. Basic cryptography. -- 4. Advanced cryptography and PKI. -- Part 3: Network attacks and defenses. -- 5. Networking and server attacks. -- 6. Network security devices, design and technologies. -- 7. Administering a secure network. -- 8. Wireless network security. -- Part 4: Device security -- 9. Client and application security.10. Mobile and embedded device security. -- Part 5: Identity and access management. -- 11. Authentication and account management -- 12. Access management. -- Part 6: Risk management. -- 13. Vulnerability assessment and data security. -- 14. Business continuity. -- 15. Risk mitigation.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu