Bild 1 von 1

Galerie
Bild 1 von 1

CompTIA Security+ Guide to Network Security Fundamentals 8th Edition by Mark Cia-
US $111,22
Ca.EUR 94,23
Artikelzustand:
Neu
Neues, ungelesenes, ungebrauchtes Buch in makellosem Zustand ohne fehlende oder beschädigte Seiten. Genauere Einzelheiten entnehmen Sie bitte dem Angebot des Verkäufers.
3 verfügbar5 verkauft
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos Economy Shipping.
Standort: Fairfield, Ohio, USA
Lieferung:
Lieferung zwischen Sa, 27. Sep und Fr, 3. Okt nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
Sicher einkaufen
- Gratis Rückversand im Inland
- Punkte für jeden Kauf und Verkauf
- Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:388659004046
Artikelmerkmale
- Artikelzustand
- ISBN-13
- 9798214000633
- Book Title
- CompTIA Security+ Guide to Network Security Fundamentals
- ISBN
- 9798214000633
Über dieses Produkt
Product Identifiers
Publisher
Cengage Learning
ISBN-10
8214000637
ISBN-13
9798214000633
eBay Product ID (ePID)
12061828708
Product Key Features
Number of Pages
608 Pages
Language
English
Publication Name
Comptia Security+ Guide to Network Security Fundamentals
Subject
Security / General
Publication Year
2024
Type
Textbook
Subject Area
Computers
Series
Mindtap Course List Ser.
Format
Trade Paperback
Dimensions
Item Height
10.8 in
Item Weight
43.2 Oz
Item Length
0.9 in
Item Width
8.4 in
Additional Product Features
Edition Number
8
Intended Audience
College Audience
Dewey Edition
23
Dewey Decimal
005.8
Table Of Content
I. SECURITY FOUNDATIONS.1. Introduction to Information Security.a. What is Information Security?i. Understanding Security.ii. Principles of Security.iii. Cybersecurity Versus Information Security.iv. Defining Information Security.b. Threat actors and Their Motivations.i. Unskilled Attackers.ii. Shadow IT.iii. Organized Crime.iv. Insider Threats.v. Hacktivists.vi. Nation-state Actors.vii. Other Threat Actors.c. How Attacks Occur.i. Threat Vectors and Attack Surfaces.ii. Categories of Vulnerabilities.iii. Impacts of Attacks.d. Information Security Resources.i. Frameworks.ii. Regulations.iii. Legislation.iv. Standards.v. Benchmarks/Secure Configuration Guides.vi. Information Sources.2. Pervasive Attack Surfaces and Controls.a. Social Engineering Attacks.i. Examples of Human Manipulation.ii. Types of Social Engineering Attacks.b. Physical Security Controls.i. Perimeter Defenses.ii. Preventing Data Leakage.iii. Computer Hardware Security.c. Data Controls.i. Data Classifications.ii. Types of Data.iii. Data Breach Consequences.iv. Protecting Data.II. CRYPTOGRAPHY.3. Fundamentals of Cryptography.a. Defining Cryptography.i. Steganography: Hiding the message.ii. Cryptography: Hiding the meaning.iii. Benefits of Cryptography.b. Cryptographic Algorithms.i. Variations of Algorithms.ii. Hash Algorithms.iii. Symmetric Cryptographic Algorithms.iv. Asymmetric Cryptographic Algorithms.c. Using Cryptography.i. Encryption Through Software.ii. Hardware Encryption.iii. Blockchain.d. Cryptographic Limitations and Attacks.i. Limitations of Cryptography.ii. Attacks on Cryptography.4. Advanced Cryptography.a. Digital Certificates.i. Defining Digital Certificates.ii. Managing Digital Certificates.iii. Types of Digital Certificates.b. Public Key Infrastructure (PKI).i. What is Public Key Infrastructure (PKI)?ii. Trust Models.iii. Managing PKI.iv. Key Management.c. Secure Communication and Transport Protocols.i. Transport Layer Security (TLS).ii. IP Security (IPSec).iii. Other Protocols.d. Implementing Cryptography.i. Key Strength.ii. Secret Algorithms.iii. Block Cipher Modes of Operation.III. DEVICE SECURITY.5. Endpoint Vulnerabilities, Attacks, and Defenses.a. Malware Attacks.i. Kidnap.ii. Eavesdrop.iii. Masquerade.iv. Launch.v. Sidestep.vi. Indicator of Attack (IoA).b. Application Vulnerabilities and Attacks.i. Application Vulnerabilities.ii. Application Attacks.c. Securing Endpoint Devices.i. Protecting Endpoints.ii. Hardening Endpoints.6. Mobile and Embedded Device Security.a. Securing Mobile Devices.i. Introduction to Mobile Devices.ii. Mobile Device Risks.iii. Protecting Mobile Devices.b. Embedded Systems and Specialized Devices.i. Types of Devices.ii. Security Considerations.c. Application Security.i. Application Development Concepts.ii. Secure Coding Techniques.iii. Code Testing.7. Identity and Access Management (IAM).a. Types of Authentication Credentials.i. Something You Know: Passwords.ii. Something You Have: Tokens and Security Keys.iii. Something You Are: Biometrics.iv. Something You Do: Behavioral biometrics.b. Authentication Best Practices.i. Securing Passwords.ii. Secure Authentication Technologies.c. Access Controls.i. Access Control Schemes.ii. Access Control Lists.IV. INFRASTRUCTURE AND ARCHITECTURES.8. Infrastructure Threats and Security Monitoring.a. Attacks on Networks.i. On-Path Attacks.ii. Domain Name System (DNS) Attacks.iii. Distributed Denial of Service (DDoS).iv. Malicious Coding and Scripting Attacks.v. Layer 2 Attacks.vi. Credential Relay Attacks.b. Security Monitoring and Alerting.i. Monitoring Methodologies.ii. Monitoring Activities.iii. Tools for Monitoring and Alerting.c. Email Monitoring and Security.i. How Email Works.ii. Email Threats.iii. Email Defenses.9. Infrastructure Security.a. Security Appliances.i. Common Network Devices.ii. Infrastructure Security Hardware.b. Software Security
Synopsis
Reflecting the latest developments and emerging trends from the field, Ciampa's COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 8th Edition, helps you prepare for professional certification and career success. The text fully maps to the new CompTIA Security+ SY0-701 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the 8th edition includes expanded coverage of information security management, artificial intelligence, compliance, cryptography and cloud and virtualization security. Practical, Hands-On Projects, case activities and online virtual labs help you put what you learn into real-world practice.
Artikelbeschreibung des Verkäufers
Rechtliche Informationen des Verkäufers
Info zu diesem Verkäufer
grandeagleretail
98,4% positive Bewertungen•2,8 Mio. Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (1.061.816)
Dieser Artikel (4)
Alle Artikel (1.061.816)
- eBay automated feedback- Bewertung vom Käufer.Letzter MonatOrder completed successfully—tracked and on time
- eBay automated feedback- Bewertung vom Käufer.Letzter MonatOrder completed successfully—tracked and on time
- eBay automated feedback- Bewertung vom Käufer.Letzter MonatOrder completed successfully—tracked and on time
- c***a (121)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufThe seller was very responsive and answered me on a timely matter. The product itself came in its packaging and was new, not used at all. The packaging was not beat up or anything, safely delivered to my mailbox. No mix ups and zero stress with delivery. The price for the product is completely understandable for the product. I really appreciate the seller and I am very happy to have purchased through this seller. Completely trustable!
- m***4 (1611)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufLeaving positive feedback because 1) item was packed well & arrived as described 2) seller did give partial refund when subsequent price dropped below org purchase price. 3) communication was quick However, there was a downside to this transaction -item listed as in-stock but ended up waiting nearly a month for them to get it from their distributer then ship it to me (bought June 29th, arrived around July 21). Auction said 12-15 days. Better clarity would have prevented lot of frustration
- w***i (880)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufAbsolutely Wonderful Seller!! Terrific Item As Described!!! Great Service and Communication!! Shipped In Waterproof Packaging!! I Received Item In About One Week!! Very Pleased With Seller! I Will Buy From This Seller Again!!
Noch mehr entdecken:
- Sachbuch-Rough-Guides Bücher,
- Hörbücher und Hörspiele Mark-Twain-Europa-Editions,
- Sachbuch Insight Guides Bücher,
- Englische Bücher Sachbuch-Rough-Guides,
- Mark-Twain-Europa-Editions Hörbücher und Hörspiele auf Englisch,
- Englische Bücher Insight-Guides-Sachbuch,
- Mark Twain Belletristik-Bücher,
- Mark Twain Belletristik Romane,
- Hörbücher und Hörspiele Action Europa Editions,
- Deutsche Bücher Mark Sullivan Belletristik