SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS

Security+ Guide to Network Security Fundamentals provides a comprehensive overview of network security. Written to map to CompTIA's Security+ Certification Exam, the book is broken down into five sections. General Security Concepts covers authentication methods along with common network attacks...

Full description

Saved in:
Bibliographic Details
Corporate Author: Cisco Learning Institute
Other Authors: Campbell, Paul, Calvert, Ben, Boswell, Steven
Format: Book
Language:English
Published: Australia Thomson Course Technology 2003
© 2003
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-317240
005 2020629162811
008 200729 2003 -CN a|| ##000 #eng#D
020 # # |a 0619212942  |q paperback 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5105.59  |b .C57 2003 
245 0 0 |a SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS  |c by Cisco Learning Institute ... [et al.] 
264 # 1 |a Australia  |b Thomson Course Technology  |c 2003 
264 # 1 |c © 2003 
300 # # |a xxii, 509 pages  |b illustrations  |c 24 cm.  |e 1 CD-ROM (4 3/4 in.) 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
500 # # |a Includes index 
500 # # |a One CD-ROM in pocket attached to inside back cover 
520 # # |a Security+ Guide to Network Security Fundamentals provides a comprehensive overview of network security. Written to map to CompTIA's Security+ Certification Exam, the book is broken down into five sections. General Security Concepts covers authentication methods along with common network attacks and how to safeguard against them. Communication Security includes remote access, e-mail, the Web, directory and file transfer, and wireless data. Infrastructure Security explores various network devices and media, and the proper use of perimeter topologies such as DMZs, Extranets, and Intranets to establish network security. Cryptography basics are provided, including the differences between asymmetric and symmetric algorithms, and the different types of PKI certificates and their usage. Operational/Organizational Security is discussed as it relates to Physical security, Disaster Recovery, and Business Continuity, as well as coverage of Computer Forensics and how it relates to further avenues of specialization for the security student 
650 # 0 |a Computer networks  |v Study guides  |x Examinations  |x Security measures 
650 # 0 |a Computer security  |v Study guides  |x Examinations  |x Certification. 
700 1 # |a Campbell, Paul 
700 # # |a Calvert, Ben 
700 # # |a Boswell, Steven 
710 1 # |a Cisco Learning Institute 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=317240 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||01500##a002.17.2||00520##a007.2||00520##b007.2||01700##a0011.2.2||02700##a0011.2.2||