Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition / Edition 5

Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition / Edition 5

ISBN-10:
1260026019
ISBN-13:
9781260026016
Pub. Date:
06/12/2018
Publisher:
McGraw-Hill Professional Publishing
ISBN-10:
1260026019
ISBN-13:
9781260026016
Pub. Date:
06/12/2018
Publisher:
McGraw-Hill Professional Publishing
Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition / Edition 5

Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition / Edition 5

$110.0
Current price is , Original price is $110.0. You
$110.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
$30.15 
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.

    • Condition: Good
    Note: Access code and/or supplemental material are not guaranteed to be included with used textbook.

Overview

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


Fully updated computer security essentials—quality approved by CompTIA

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written by a pair of highly respected security educators, Principles of Computer Security: CompTIA Security+® and Beyond, Fifth Edition (Exam SY0-501) will help you pass the exam and become a CompTIA certified computer security expert.

Find out how to:

•Ensure operational, organizational, and physical security

•Use cryptography and public key infrastructures (PKIs)

•Secure remote access, wireless networks, and virtual private networks (VPNs)

•Authenticate users and lock down mobile devices

•Harden network devices, operating systems, and applications

•Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing

•Combat viruses, worms, Trojan horses, and rootkits

•Manage e-mail, instant messaging, and web security

•Explore secure software development requirements

•Implement disaster recovery and business continuity measures

•Handle computer forensics and incident response

•Understand legal, ethical, and privacy issues

The CD-ROM features:

•Test engine that provides full-length practice exams and customized quizzes by chapter or exam objective

•PDF copy of the book

Each chapter includes:

•Learning objectives

•Real-world examples

•Try This! and Cross Check exercises

•Tech Tips, Notes, and Warnings

•Exam Tips

•End-of-chapter quizzes and lab projects


Product Details

ISBN-13: 9781260026016
Publisher: McGraw-Hill Professional Publishing
Publication date: 06/12/2018
Edition description: New Edition
Pages: 848
Product dimensions: 8.40(w) x 10.70(h) x 1.30(d)

About the Author

Wm. Arthur Conklin, Ph.D., CompTIA Security+, CISSP, is an associate professor in the College of Technology at the University of Houston. He is the director of the Center for Information Security Research and Education at UH.

Gregory White, Ph.D., is a professor in the Department of Computer Science at the University of Texas at San Antonio. He is the director for the Center for Infrastructure Assurance and Security at UTSA.

Table of Contents

Chapter 1: Introduction and Security Trends
Chapter 2: General Security Concepts
Chapter 3: Operational and Organizational Security
Chapter 4: The Role of People in Security
Chapter 5: Cryptography
Chapter 6: Applied Cryptography
Chapter 7: Public Key Infrastructure
Chapter 8: Physical Security
Chapter 9: Network Fundamentals
Chapter 10: Infrastructure Security
Chapter 11: Authentication and Remote Access
Chapter 12: Wireless Security and Mobile Devices
Chapter 13: Intrusion Detection Systems and Network Security
Chapter 14: System Hardening and Baselines
Chapter 15: Types of Attacks and Malicious Software
Chapter 16: E-mail and Instant Messaging
Chapter 17: Web Components
Chapter 18: Secure Software Development
Chapter 19: Business Continuity and Disaster Recovery, and Organizational Policies
Chapter 20: Risk Management
Chapter 21: Change Management
Chapter 22: Incident Response
Chapter 23: Computer Forensics
Chapter 24: Legal Issues and Ethics
Chapter 25: Privacy
Appendix A: CompTIA Security+ Exam Objecitves: SYO-501
Appendix B: About the CD
Glossary
From the B&N Reads Blog

Customer Reviews