Foto 1 di 1

Galleria
Foto 1 di 1

Ne hai uno da vendere?
CompTIA Security+ Guide to Network Security Fundamentals 8th Edition by Mark Cia
US $111,22
CircaEUR 94,13
Condizione:
Nuovo
Libro nuovo, intatto e non letto, in perfette condizioni, senza pagine mancanti o danneggiate. Per maggiori dettagli, consulta l'inserzione del venditore.
3 disponibili5 venduti
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Spedizione:
Gratis Economy Shipping.
Oggetto che si trova a: Fairfield, Ohio, Stati Uniti
Consegna:
Consegna prevista tra il lun 29 set e il sab 4 ott a 94104
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Pagamenti:
Fai shopping in tutta sicurezza
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:388659004046
Specifiche dell'oggetto
- Condizione
- ISBN-13
- 9798214000633
- Book Title
- CompTIA Security+ Guide to Network Security Fundamentals
- ISBN
- 9798214000633
Informazioni su questo prodotto
Product Identifiers
Publisher
Cengage Learning
ISBN-10
8214000637
ISBN-13
9798214000633
eBay Product ID (ePID)
12061828708
Product Key Features
Number of Pages
608 Pages
Language
English
Publication Name
Comptia Security+ Guide to Network Security Fundamentals
Subject
Security / General
Publication Year
2024
Type
Textbook
Subject Area
Computers
Series
Mindtap Course List Ser.
Format
Trade Paperback
Dimensions
Item Height
10.8 in
Item Weight
43.2 Oz
Item Length
0.9 in
Item Width
8.4 in
Additional Product Features
Edition Number
8
Intended Audience
College Audience
Dewey Edition
23
Dewey Decimal
005.8
Table Of Content
I. SECURITY FOUNDATIONS.1. Introduction to Information Security.a. What is Information Security?i. Understanding Security.ii. Principles of Security.iii. Cybersecurity Versus Information Security.iv. Defining Information Security.b. Threat actors and Their Motivations.i. Unskilled Attackers.ii. Shadow IT.iii. Organized Crime.iv. Insider Threats.v. Hacktivists.vi. Nation-state Actors.vii. Other Threat Actors.c. How Attacks Occur.i. Threat Vectors and Attack Surfaces.ii. Categories of Vulnerabilities.iii. Impacts of Attacks.d. Information Security Resources.i. Frameworks.ii. Regulations.iii. Legislation.iv. Standards.v. Benchmarks/Secure Configuration Guides.vi. Information Sources.2. Pervasive Attack Surfaces and Controls.a. Social Engineering Attacks.i. Examples of Human Manipulation.ii. Types of Social Engineering Attacks.b. Physical Security Controls.i. Perimeter Defenses.ii. Preventing Data Leakage.iii. Computer Hardware Security.c. Data Controls.i. Data Classifications.ii. Types of Data.iii. Data Breach Consequences.iv. Protecting Data.II. CRYPTOGRAPHY.3. Fundamentals of Cryptography.a. Defining Cryptography.i. Steganography: Hiding the message.ii. Cryptography: Hiding the meaning.iii. Benefits of Cryptography.b. Cryptographic Algorithms.i. Variations of Algorithms.ii. Hash Algorithms.iii. Symmetric Cryptographic Algorithms.iv. Asymmetric Cryptographic Algorithms.c. Using Cryptography.i. Encryption Through Software.ii. Hardware Encryption.iii. Blockchain.d. Cryptographic Limitations and Attacks.i. Limitations of Cryptography.ii. Attacks on Cryptography.4. Advanced Cryptography.a. Digital Certificates.i. Defining Digital Certificates.ii. Managing Digital Certificates.iii. Types of Digital Certificates.b. Public Key Infrastructure (PKI).i. What is Public Key Infrastructure (PKI)?ii. Trust Models.iii. Managing PKI.iv. Key Management.c. Secure Communication and Transport Protocols.i. Transport Layer Security (TLS).ii. IP Security (IPSec).iii. Other Protocols.d. Implementing Cryptography.i. Key Strength.ii. Secret Algorithms.iii. Block Cipher Modes of Operation.III. DEVICE SECURITY.5. Endpoint Vulnerabilities, Attacks, and Defenses.a. Malware Attacks.i. Kidnap.ii. Eavesdrop.iii. Masquerade.iv. Launch.v. Sidestep.vi. Indicator of Attack (IoA).b. Application Vulnerabilities and Attacks.i. Application Vulnerabilities.ii. Application Attacks.c. Securing Endpoint Devices.i. Protecting Endpoints.ii. Hardening Endpoints.6. Mobile and Embedded Device Security.a. Securing Mobile Devices.i. Introduction to Mobile Devices.ii. Mobile Device Risks.iii. Protecting Mobile Devices.b. Embedded Systems and Specialized Devices.i. Types of Devices.ii. Security Considerations.c. Application Security.i. Application Development Concepts.ii. Secure Coding Techniques.iii. Code Testing.7. Identity and Access Management (IAM).a. Types of Authentication Credentials.i. Something You Know: Passwords.ii. Something You Have: Tokens and Security Keys.iii. Something You Are: Biometrics.iv. Something You Do: Behavioral biometrics.b. Authentication Best Practices.i. Securing Passwords.ii. Secure Authentication Technologies.c. Access Controls.i. Access Control Schemes.ii. Access Control Lists.IV. INFRASTRUCTURE AND ARCHITECTURES.8. Infrastructure Threats and Security Monitoring.a. Attacks on Networks.i. On-Path Attacks.ii. Domain Name System (DNS) Attacks.iii. Distributed Denial of Service (DDoS).iv. Malicious Coding and Scripting Attacks.v. Layer 2 Attacks.vi. Credential Relay Attacks.b. Security Monitoring and Alerting.i. Monitoring Methodologies.ii. Monitoring Activities.iii. Tools for Monitoring and Alerting.c. Email Monitoring and Security.i. How Email Works.ii. Email Threats.iii. Email Defenses.9. Infrastructure Security.a. Security Appliances.i. Common Network Devices.ii. Infrastructure Security Hardware.b. Software Security
Synopsis
Reflecting the latest developments and emerging trends from the field, Ciampa's COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 8th Edition, helps you prepare for professional certification and career success. The text fully maps to the new CompTIA Security+ SY0-701 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the 8th edition includes expanded coverage of information security management, artificial intelligence, compliance, cryptography and cloud and virtualization security. Practical, Hands-On Projects, case activities and online virtual labs help you put what you learn into real-world practice.
Descrizione dell'oggetto fatta dal venditore
Informazioni sul venditore professionale
Informazioni su questo venditore
grandeagleretail
98,5% di Feedback positivi•2,8 milioni oggetti venduti
Registrato come venditore professionale
Feedback sul venditore (1.062.343)
Questo oggetto (4)
Tutti gli oggetti (1.062.343)
- eBay automated feedback- Feedback lasciato dall'acquirente.Mese scorsoOrder completed successfully—tracked and on time
- eBay automated feedback- Feedback lasciato dall'acquirente.Mese scorsoOrder completed successfully—tracked and on time
- eBay automated feedback- Feedback lasciato dall'acquirente.Mese scorsoOrder completed successfully—tracked and on time
- c***a (121)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoThe seller was very responsive and answered me on a timely matter. The product itself came in its packaging and was new, not used at all. The packaging was not beat up or anything, safely delivered to my mailbox. No mix ups and zero stress with delivery. The price for the product is completely understandable for the product. I really appreciate the seller and I am very happy to have purchased through this seller. Completely trustable!
- m***4 (1611)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoLeaving positive feedback because 1) item was packed well & arrived as described 2) seller did give partial refund when subsequent price dropped below org purchase price. 3) communication was quick However, there was a downside to this transaction -item listed as in-stock but ended up waiting nearly a month for them to get it from their distributer then ship it to me (bought June 29th, arrived around July 21). Auction said 12-15 days. Better clarity would have prevented lot of frustration
- w***i (880)- Feedback lasciato dall'acquirente.Ultimi 6 mesiAcquisto verificatoAbsolutely Wonderful Seller!! Terrific Item As Described!!! Great Service and Communication!! Shipped In Waterproof Packaging!! I Received Item In About One Week!! Very Pleased With Seller! I Will Buy From This Seller Again!!