Search Books
Multimedia Making It Work E… Practical DMX Queries for M…

Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition (CompTIA Authorized)

Author Vincent Nestler, Gregory White, Wm. Arthur Conklin, Matthew Hirsch, Corey Schou
Publisher McGraw-Hill Osborne Media
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
Price not listed
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $1.40
Share:
Book Details
ISBN / ASIN0071748563
ISBN-139780071748568
Sales Rank618,665
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Written by leading IT security educators, this fully updated Lab Manual supplements Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition

Principles of Computer Security Lab Manual, Second Edition, contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence to Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition.

The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the Key Term Quiz helps to build vocabulary.

Principles of Computer Security Lab Manual, Second Edition, features:

  • New, more dynamic design and a larger trim size
  • The real-world, hands-on practice you need to pass the certification exam and succeed on the job
  • Lab solutions on the textbook OLC (Online Learning Center)

All-inclusive coverage:
Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy

Linux in Plain English
View
Designing Enterprise Applications with the Java(TM) 2 …
View
Distributed .NET Programming in VB .NET
View
Sams Teach Yourself Android Application Development in…
View
Applied Data Communications: A Business-Oriented Appro…
View
OSPF: Anatomy of an Internet Routing Protocol
View
Web Scalability for Startup Engineers
View
Industrial Electronics
View