|
|
|
|
LEADER |
04670nmm a2200505 u 4500 |
001 |
EB001935399 |
003 |
EBX01000000000000001098301 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9780071832175
|
020 |
|
|
|a 0071832149
|
020 |
|
|
|a 0071832173
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Dunkerley, Dawn
|
245 |
0 |
0 |
|a CompTIA security+ (exam SY0-401)
|c Dawn Dunkerley, T.J. Samuelle
|
246 |
3 |
1 |
|a CompTIA security+ certification passport (exam SY0-401)
|
250 |
|
|
|a 4th ed
|
260 |
|
|
|a New York
|b McGraw-Hill Education
|c 2014
|
300 |
|
|
|a 1 volume
|b illustrations
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Check-In -- Part I: Organizational Security -- Chapter 1: Organizational Security and Compliance -- Objective 1.01 Explain Risk-Related Concepts -- Risk Control Types -- Risk Assessment -- Risk Management Options -- False Positives and Negatives -- Use Organizational Policies to Reduce Risk -- Objective 1.02 Implement Appropriate Risk Mitigation Strategies -- Change Management Policy -- Incident Management and Response Policy -- Perform Routine Audits -- User Rights and Permissions Reviews
|
505 |
0 |
|
|a Whaling -- Shoulder Surfing -- Tailgating -- Pharming -- Spim -- Vishing -- Spam -- Hoaxes -- Objective 2.03 Execute Appropriate Incident Response Procedures -- Preparation -- Incident Identification -- First Responders -- Incident Isolation -- Damage and Loss Control -- Escalation Policy -- Reporting and Notification -- Mitigation and Recovery Steps -- Lessons Learned -- Objective 2.04 Implement Basic Forensic Procedures -- Collection and Preservation of Evidence -- Chapter 3: Business Continuity and Disaster Recovery -- Objective 3.01 Compare and Contrast Aspects of Business Continuity
|
505 |
0 |
|
|a Recovery Plans -- Objective 3.02 Execute Disaster Recovery Plans and Procedures -- High Availability and Redundancy Planning -- Fault Tolerance -- Objective 3.03 Select the Appropriate Control to Meet the Goals of Security -- Objective 3.04 Explain the Impact and Proper Use of Environmental Controls -- Facility Construction Issues -- Environmental Issues -- Cable Shielding -- Fire Suppression -- Part II: Cryptography -- Chapter 4: Cryptography and Encryption Basics -- Objective 4.01 Utilize the Concepts of Cryptography -- Information Assurance -- Algorithms -- Steganography -- Digital Signatures
|
505 |
0 |
|
|a Basic Hashing Concepts -- Message Digest Hashing -- Secure Hash Algorithm (SHA) -- RIPEMD -- HMAC -- Objective 4.02 Use and Apply Appropriate Cryptographic Tools and Products -- Symmetric Encryption Algorithms -- Asymmetric Encryption Algorithms -- One-Time Pad -- Quantum Cryptography -- Implementing Encryption Protocols -- Wireless Encryption -- Chapter 5: Public Key Infrastructure -- Objective 5.01 Explain the Core Concepts of Public Key Infrastructure -- Digital Certificates -- Certificate Authorities -- Trust Models -- Key Management and Storage
|
505 |
0 |
|
|a Data Loss Prevention and Regulatory Compliance -- Objective 1.03 Integrate with Third Parties -- Interoperability Agreements -- Privacy Considerations -- Risk Awareness -- Unauthorized Data Sharing -- Data Ownerships -- Data Backup -- Verification of Adherence -- Chapter 2: Security Training and Incident Response -- Objective 2.01 Explain the Importance of Security-Related Awareness and Training -- Accessing Policy Documentation -- Data and Documentation Policies -- Best Practices for User Habits -- Objective 2.02 Analyze and Differentiate Among Types of Social Engineering Attacks -- Phishing
|
653 |
|
|
|a Computer networks / Security measures / Examinations / fast
|
653 |
|
|
|a Computer security / Examinations / Study guides
|
653 |
|
|
|a Computer networks / Security measures / Examinations / Study guides
|
653 |
|
|
|a Electronic data processing personnel / Certification / fast
|
653 |
|
|
|a Electronic data processing personnel / Certification
|
653 |
|
|
|a Computer security / Examinations / fast
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures / Examens / Guides de l'étudiant
|
653 |
|
|
|a Sécurité informatique / Examens / Guides de l'étudiant
|
700 |
1 |
|
|a Meyers, Mike
|
700 |
1 |
|
|a Samuelle, T. J.
|
710 |
2 |
|
|a Computing Technology Industry Association
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a Mike Meyers' certification passport
|
500 |
|
|
|a Includes index
|
776 |
|
|
|z 9780071832144
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071832144/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 374
|
082 |
0 |
|
|a 005.8
|