SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS
Security+ Guide to Network Security Fundamentals provides a comprehensive overview of network security. Written to map to CompTIA's Security+ Certification Exam, the book is broken down into five sections. General Security Concepts covers authentication methods along with common network attacks...
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , , |
Format: | Book |
Language: | English |
Published: |
Australia
Thomson Course Technology
2003
© 2003 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-317240 | ||
005 | 2020629162811 | ||
008 | 200729 2003 -CN a|| ##000 #eng#D | ||
020 | # | # | |a 0619212942 |q paperback |
040 | # | # | |a UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5105.59 |b .C57 2003 |
245 | 0 | 0 | |a SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS |c by Cisco Learning Institute ... [et al.] |
264 | # | 1 | |a Australia |b Thomson Course Technology |c 2003 |
264 | # | 1 | |c © 2003 |
300 | # | # | |a xxii, 509 pages |b illustrations |c 24 cm. |e 1 CD-ROM (4 3/4 in.) |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
500 | # | # | |a Includes index |
500 | # | # | |a One CD-ROM in pocket attached to inside back cover |
520 | # | # | |a Security+ Guide to Network Security Fundamentals provides a comprehensive overview of network security. Written to map to CompTIA's Security+ Certification Exam, the book is broken down into five sections. General Security Concepts covers authentication methods along with common network attacks and how to safeguard against them. Communication Security includes remote access, e-mail, the Web, directory and file transfer, and wireless data. Infrastructure Security explores various network devices and media, and the proper use of perimeter topologies such as DMZs, Extranets, and Intranets to establish network security. Cryptography basics are provided, including the differences between asymmetric and symmetric algorithms, and the different types of PKI certificates and their usage. Operational/Organizational Security is discussed as it relates to Physical security, Disaster Recovery, and Business Continuity, as well as coverage of Computer Forensics and how it relates to further avenues of specialization for the security student |
650 | # | 0 | |a Computer networks |v Study guides |x Examinations |x Security measures |
650 | # | 0 | |a Computer security |v Study guides |x Examinations |x Certification. |
700 | 1 | # | |a Campbell, Paul |
700 | # | # | |a Calvert, Ben |
700 | # | # | |a Boswell, Steven |
710 | 1 | # | |a Cisco Learning Institute |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=317240 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||01500##a002.17.2||00520##a007.2||00520##b007.2||01700##a0011.2.2||02700##a0011.2.2|| |