Amazon cover image
Image from Amazon.com

Eleventh hour security+ : exam SYO-201 study guide / by Ido Dubrawsky.

By: Contributor(s): 2009Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781597494274
  • 1597494275
  • 9781597494946
  • 1597494941
Subject(s): Genre/Form: Additional physical formats: Print version:: Eleventh hour security.LOC classification:
  • QA76.9.A25 D83 2009
Online resources:
Contents:
Front Cover; Eleventh Hour Security+; Copyright Page; Contents; About the Authors; CHAPTER 1 Systems Security; CHAPTER 2 OS Hardening; CHAPTER 3 Application Security; CHAPTER 4 Virtualization Technologies; CHAPTER 5 Network Security; CHAPTER 6 Wireless Networks; CHAPTER 7 Network Access; CHAPTER 8 Network Authentication; CHAPTER 9 Risk Assessment and Risk Mitigation; CHAPTER 10 General Cryptographic Concepts; CHAPTER 11 Public Key Infrastructure; CHAPTER 12 Redundancy Planning; CHAPTER 13 Controls and Procedures; CHAPTER 14 Legislation and Organizational Policies; Index.
Summary: This book will focus on just the essentials needed to pass the Security+ certification exam. It will be filled with critical information in a way that will be easy to remember and use for your quickly approaching exam. It will focus on the main objectives of the exam and include the following pedagogy for ease of use in those final hours.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

This book will focus on just the essentials needed to pass the Security+ certification exam. It will be filled with critical information in a way that will be easy to remember and use for your quickly approaching exam. It will focus on the main objectives of the exam and include the following pedagogy for ease of use in those final hours.

Print version record.

Front Cover; Eleventh Hour Security+; Copyright Page; Contents; About the Authors; CHAPTER 1 Systems Security; CHAPTER 2 OS Hardening; CHAPTER 3 Application Security; CHAPTER 4 Virtualization Technologies; CHAPTER 5 Network Security; CHAPTER 6 Wireless Networks; CHAPTER 7 Network Access; CHAPTER 8 Network Authentication; CHAPTER 9 Risk Assessment and Risk Mitigation; CHAPTER 10 General Cryptographic Concepts; CHAPTER 11 Public Key Infrastructure; CHAPTER 12 Redundancy Planning; CHAPTER 13 Controls and Procedures; CHAPTER 14 Legislation and Organizational Policies; Index.

Elsevier ScienceDirect All Books

Safari Books Online Safari Tech Books Online

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu