Principles of computer security

著者

書誌事項

Principles of computer security

Wm. Arthur Conklin ... [et al.]

McGraw-Hill Education, c2016

4th ed.

大学図書館所蔵 件 / 1

この図書・雑誌をさがす

注記

Other editors: Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren

Includes bibliographical references and index

内容説明・目次

内容説明

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA's fastest-growing credential, CompTIA Security+.Principles of Computer Security, Fourth Edition is a student-tested, introductory computer security textbook that provides comprehensive coverage of computer and network security fundamentals in an engaging and dynamic full-color design. In addition to teaching key computer security concepts, the textbook also fully prepares you for CompTIA Security+ exam SY0-401 with 100% coverage of all exam objectives. Each chapter begins with a list of topics to be covered and features sidebar exam and tech tips, a chapter summary, and an end-of-chapter assessment section that includes key term, multiple choice, and essay quizzes as well as lab projects. Electronic content includes CompTIA Security+ practice exam questions and a PDF copy of the book. Key features: CompTIA Approved Quality Content (CAQC) Electronic content features two simulated practice exams in the Total Tester exam engine and a PDF eBook Supplemented by Principles of Computer Security Lab Manual, Fourth Edition, available separately White and Conklin are two of the most well-respected computer security educators in higher education Instructor resource materials for adopting instructors include: Instructor Manual, PowerPoint slides featuring artwork from the book, and a test bank of questions for use as quizzes or exams Answers to the end of chapter sections are not included in the book and are only available to adopting instructors Learn how to: Ensure operational, organizational, and physical security Use cryptography and public key infrastructures (PKIs) Secure remote access, wireless networks, and virtual private networks (VPNs) Authenticate users and lock down mobile devices Harden network devices, operating systems, and applications Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing Combat viruses, worms, Trojan horses, and rootkits Manage e-mail, instant messaging, and web security Explore secure software development requirements Implement disaster recovery and business continuity measures Handle computer forensics and incident response Understand legal, ethical, and privacy issues

目次

Chapter 1: Introduction and Security Trends Chapter 2: General Security Concepts Chapter 3: Operational/Organizational Security Chapter 4: The Role of People in Security Chapter 5: Cryptography Chapter 6: Public Key Infrastructure Chapter 7: Standards and Protocols Chapter 8: Physical Security Chapter 9: Network Fundamentals Chapter 10: Infrastructure Security Chapter 11: Authentication and Remote Access Chapter 12: Wireless Security and Mobile Devices Chapter 13: Intrusion Detection Systems and Network Security Chapter 14: Baselines Chapter 15: Types of Attacks and Malicious Software Chapter 16: E-mail and Instant Messaging Chapter 17: Web Components Chapter 18: Secure Software Development Chapter 19: Disaster Recovery, Business Continuity, and Organizational Policies Chapter 20: Risk Management Chapter 21: Change Management Chapter 22: Incident Response Chapter 23: Computer Forensics Chapter 24: Legal Issues and Ethics Chapter 25: Privacy App A Objective Map App B About the CD-ROM Glossary Index

「Nielsen BookData」 より

詳細情報

ページトップへ