Normal view MARC view ISBD view

Comptia security+ guide to network security fundamentals

By: Ciampa, Mark D
Publisher: Boston, MA : CENGAGE Learning Custom Publishing, c2018.Edition: 6th ed.Description: xxvi, 756 p. : ill. ; 22 cm.ISBN: 9781337288781Other title: Comptia security plus guide to network security fundamentals.Subject(s): Network security | CryptographyDDC classification: 005.8 CI CO Online resources: Location Map
Summary:
Mapped to the new CompTIA Security+ SY0-501 Certification Exam, best-selling COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, thoroughly prepares readers for professional certification and career success. The text covers threats, attacks, and vulnerabilities; technologies and tools for combating attacks, architecture, and design; identity and access management; risk management; and cryptography. It also includes expansive coverage of embedded device security, attacks and defenses, and the latest developments and trends in information security, including new software tools to assess security. New Hands-On Projectsand case activities help readers put what they learn into practice, while end-of-chapter exercises direct them to the Information Security Community Site for additional activities, blogs, videos, and up-to-the-minute news and insight from the field.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
005.8 CI CO (Browse shelf) Available T0057839
REGULAR University of Wollongong in Dubai
Main Collection
005.8 CI CO (Browse shelf) Available T0057944
Total holds: 0

Mapped to the new CompTIA Security+ SY0-501 Certification Exam, best-selling COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, thoroughly prepares readers for professional certification and career success. The text covers threats, attacks, and vulnerabilities; technologies and tools for combating attacks, architecture, and design; identity and access management; risk management; and cryptography. It also includes expansive coverage of embedded device security, attacks and defenses, and the latest developments and trends in information security, including new software tools to assess security. New Hands-On Projectsand case activities help readers put what they learn into practice, while end-of-chapter exercises direct them to the Information Security Community Site for additional activities, blogs, videos, and up-to-the-minute news and insight from the field.

Powered by Koha