CompTIA Security+ Guide to Network Security Fundamentals 8th Edition by Mark Cia-

Ursprünglicher Text
CompTIA Security+ Guide to Network Security Fundamentals 8th Edition by Mark Cia
grandeagleretail
(952739)
Angemeldet als gewerblicher Verkäufer
US $111,22
Ca.EUR 94,23
Artikelzustand:
Neu
3 verfügbar5 verkauft
Ganz entspannt. Rückgaben akzeptiert.
Beliebter Artikel. Schon 5 verkauft.
Versand:
Kostenlos Economy Shipping.
Standort: Fairfield, Ohio, USA
Lieferung:
Lieferung zwischen Sa, 27. Sep und Fr, 3. Okt nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
   Diners Club 

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet

  • Gratis Rückversand im Inland
  • Punkte für jeden Kauf und Verkauf
  • Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:388659004046
Zuletzt aktualisiert am 21. Sep. 2025 14:15:16 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Neu: Neues, ungelesenes, ungebrauchtes Buch in makellosem Zustand ohne fehlende oder beschädigte ...
ISBN-13
9798214000633
Book Title
CompTIA Security+ Guide to Network Security Fundamentals
ISBN
9798214000633
Kategorie

Über dieses Produkt

Product Identifiers

Publisher
Cengage Learning
ISBN-10
8214000637
ISBN-13
9798214000633
eBay Product ID (ePID)
12061828708

Product Key Features

Number of Pages
608 Pages
Language
English
Publication Name
Comptia Security+ Guide to Network Security Fundamentals
Subject
Security / General
Publication Year
2024
Type
Textbook
Subject Area
Computers
Author
Mark Ciampa
Series
Mindtap Course List Ser.
Format
Trade Paperback

Dimensions

Item Height
10.8 in
Item Weight
43.2 Oz
Item Length
0.9 in
Item Width
8.4 in

Additional Product Features

Edition Number
8
Intended Audience
College Audience
Dewey Edition
23
Dewey Decimal
005.8
Table Of Content
I. SECURITY FOUNDATIONS.1. Introduction to Information Security.a. What is Information Security?i. Understanding Security.ii. Principles of Security.iii. Cybersecurity Versus Information Security.iv. Defining Information Security.b. Threat actors and Their Motivations.i. Unskilled Attackers.ii. Shadow IT.iii. Organized Crime.iv. Insider Threats.v. Hacktivists.vi. Nation-state Actors.vii. Other Threat Actors.c. How Attacks Occur.i. Threat Vectors and Attack Surfaces.ii. Categories of Vulnerabilities.iii. Impacts of Attacks.d. Information Security Resources.i. Frameworks.ii. Regulations.iii. Legislation.iv. Standards.v. Benchmarks/Secure Configuration Guides.vi. Information Sources.2. Pervasive Attack Surfaces and Controls.a. Social Engineering Attacks.i. Examples of Human Manipulation.ii. Types of Social Engineering Attacks.b. Physical Security Controls.i. Perimeter Defenses.ii. Preventing Data Leakage.iii. Computer Hardware Security.c. Data Controls.i. Data Classifications.ii. Types of Data.iii. Data Breach Consequences.iv. Protecting Data.II. CRYPTOGRAPHY.3. Fundamentals of Cryptography.a. Defining Cryptography.i. Steganography: Hiding the message.ii. Cryptography: Hiding the meaning.iii. Benefits of Cryptography.b. Cryptographic Algorithms.i. Variations of Algorithms.ii. Hash Algorithms.iii. Symmetric Cryptographic Algorithms.iv. Asymmetric Cryptographic Algorithms.c. Using Cryptography.i. Encryption Through Software.ii. Hardware Encryption.iii. Blockchain.d. Cryptographic Limitations and Attacks.i. Limitations of Cryptography.ii. Attacks on Cryptography.4. Advanced Cryptography.a. Digital Certificates.i. Defining Digital Certificates.ii. Managing Digital Certificates.iii. Types of Digital Certificates.b. Public Key Infrastructure (PKI).i. What is Public Key Infrastructure (PKI)?ii. Trust Models.iii. Managing PKI.iv. Key Management.c. Secure Communication and Transport Protocols.i. Transport Layer Security (TLS).ii. IP Security (IPSec).iii. Other Protocols.d. Implementing Cryptography.i. Key Strength.ii. Secret Algorithms.iii. Block Cipher Modes of Operation.III. DEVICE SECURITY.5. Endpoint Vulnerabilities, Attacks, and Defenses.a. Malware Attacks.i. Kidnap.ii. Eavesdrop.iii. Masquerade.iv. Launch.v. Sidestep.vi. Indicator of Attack (IoA).b. Application Vulnerabilities and Attacks.i. Application Vulnerabilities.ii. Application Attacks.c. Securing Endpoint Devices.i. Protecting Endpoints.ii. Hardening Endpoints.6. Mobile and Embedded Device Security.a. Securing Mobile Devices.i. Introduction to Mobile Devices.ii. Mobile Device Risks.iii. Protecting Mobile Devices.b. Embedded Systems and Specialized Devices.i. Types of Devices.ii. Security Considerations.c. Application Security.i. Application Development Concepts.ii. Secure Coding Techniques.iii. Code Testing.7. Identity and Access Management (IAM).a. Types of Authentication Credentials.i. Something You Know: Passwords.ii. Something You Have: Tokens and Security Keys.iii. Something You Are: Biometrics.iv. Something You Do: Behavioral biometrics.b. Authentication Best Practices.i. Securing Passwords.ii. Secure Authentication Technologies.c. Access Controls.i. Access Control Schemes.ii. Access Control Lists.IV. INFRASTRUCTURE AND ARCHITECTURES.8. Infrastructure Threats and Security Monitoring.a. Attacks on Networks.i. On-Path Attacks.ii. Domain Name System (DNS) Attacks.iii. Distributed Denial of Service (DDoS).iv. Malicious Coding and Scripting Attacks.v. Layer 2 Attacks.vi. Credential Relay Attacks.b. Security Monitoring and Alerting.i. Monitoring Methodologies.ii. Monitoring Activities.iii. Tools for Monitoring and Alerting.c. Email Monitoring and Security.i. How Email Works.ii. Email Threats.iii. Email Defenses.9. Infrastructure Security.a. Security Appliances.i. Common Network Devices.ii. Infrastructure Security Hardware.b. Software Security
Synopsis
Reflecting the latest developments and emerging trends from the field, Ciampa's COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 8th Edition, helps you prepare for professional certification and career success. The text fully maps to the new CompTIA Security+ SY0-701 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the 8th edition includes expanded coverage of information security management, artificial intelligence, compliance, cryptography and cloud and virtualization security. Practical, Hands-On Projects, case activities and online virtual labs help you put what you learn into real-world practice.

Artikelbeschreibung des Verkäufers

Rechtliche Informationen des Verkäufers

Ich versichere, dass alle meine Verkaufsaktivitäten in Übereinstimmung mit allen geltenden Gesetzen und Vorschriften der EU erfolgen.
Info zu diesem Verkäufer

grandeagleretail

98,4% positive Bewertungen2,8 Mio. Artikel verkauft

Mitglied seit Sep 2010
Antwortet meist innerhalb 12 Stunden
Angemeldet als gewerblicher Verkäufer
Grand Eagle Retail is your online bookstore. We offer Great books, Great prices and Great service.
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
4.9

Verkäuferbewertungen (1.061.816)

  • c***a (121)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    The seller was very responsive and answered me on a timely matter. The product itself came in its packaging and was new, not used at all. The packaging was not beat up or anything, safely delivered to my mailbox. No mix ups and zero stress with delivery. The price for the product is completely understandable for the product. I really appreciate the seller and I am very happy to have purchased through this seller. Completely trustable!
  • m***4 (1611)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    Leaving positive feedback because 1) item was packed well & arrived as described 2) seller did give partial refund when subsequent price dropped below org purchase price. 3) communication was quick However, there was a downside to this transaction -item listed as in-stock but ended up waiting nearly a month for them to get it from their distributer then ship it to me (bought June 29th, arrived around July 21). Auction said 12-15 days. Better clarity would have prevented lot of frustration
  • w***i (880)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    Absolutely Wonderful Seller!! Terrific Item As Described!!! Great Service and Communication!! Shipped In Waterproof Packaging!! I Received Item In About One Week!! Very Pleased With Seller! I Will Buy From This Seller Again!!
Alle Bewertungen ansehen