Security+ Study Guide and DVD Training System
Norris L. Johnson, Michael Cross, Tony Piltzecker
- 出版商: Syngress Media
- 售價: $2,340
- 貴賓價: 9.5 折 $2,223
- 語言: 英文
- 頁數: 824
- 裝訂: Hardcover
- ISBN: 1931836728
- ISBN-13: 9781931836722
-
相關分類:
資訊安全
已過版
買這商品的人也買了...
-
$680$537 -
$580$522 -
$860$774 -
$400$340 -
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$860$731 -
$1,890$1,796 -
$450$360 -
$560$504 -
$450$351 -
$620$558 -
$600$474 -
$750$638 -
$620$558 -
$420$378 -
$650$553 -
$580$458 -
$590$466 -
$620$527 -
$720$562 -
$780$616 -
$720$569 -
$390$304 -
$1,815$1,724
相關主題
商品描述
Computer and network security is the hottest subspecialty in the IT field today. CompTIA's Security+ exam focuses on this field. The Security+ Study Guide & DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation, giving students 100% coverage of official CompTIA Security+ exam objectives plus realistic test prep for the edge they need to achieve certification on their first try.
Completely
Guaranteed Coverage of All Exam Objectives
If the topic is listed in the
exam objectives, it is covered here.
Fully Integrated
Learning
This package includes a Study Guide, a DVD-containing instructor
led training, and Web-based exam simulation and remediation.
The topics covered in the book include:
- General Security Concepts: Access Control, Authentication, and Auditing
- General Security Concepts: Attacks
- Communication Security: Remote Access and E-mail
- Communication Security: Wireless
- Communication Security: Web Based Services
- Infrastructure Security: Devices and Media
- Topologies and IDS
- Infrastructure Security: System Hardening
- Basics of Cryptography
Contents
Introduction
Chapter
2 Attacks
Chapter
3 Remote Access and E-mail
Chapter
4 Wireless
Chapter
5 Web Security
Chapter
6 Devices and Media
Chapter 7 Topologies and
IDS
Chapter
8 System Hardening
Chapter
9 Basics of Cryptography
Chapter
10 Public Key Infrastructure
Chapter 11 Incident Response
Chapter 12 Policies and Disaster
Recovery