CompTIA security+ : (Record no. 746)

MARC details
000 -LEADER
fixed length control field 05306cam a2200361 i 4500
001 - CONTROL NUMBER
control field 15468116
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230531130500.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 080929s2009 inua 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008042927
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470404843
Qualifying information paperback
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency DLC
-- EG-CaTKH
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.3
Item number .S747 2009
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 ST.S 2009 G.C
Item number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stewart, James Michael,
Relator term author.
245 10 - TITLE STATEMENT
Title CompTIA security+ :
Remainder of title review guide /
Statement of responsibility, etc. James Michael Stewart.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, Indiana :
Name of producer, publisher, distributor, manufacturer Wiley Publishing,
Date of production, publication, distribution, manufacture, or copyright notice 2009.
300 ## - PHYSICAL DESCRIPTION
Extent xxxv, 245 pages :
Other physical details illustrations ;
Dimensions 24 cm. +
Accompanying material 1 CD-ROM (4 3/4 in.)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- 1. Systems Security -- 1.1. Differentiate among various systems security threats. -- 1.2. Explain the security risks pertaining to system hardware and peripherals. -- 1.3. Implement OS hardening practices and procedures to achieve workstation and server security. -- 1.4. Carry out the appropriate procedures to establish application security. -- 1.5. Implement security applications. -- 1.6. Explain the purpose and application of virtualization technology. -- 2. Network Infrastructure -- 2.1. Differentiate between the different ports & protocols, their respective threats and mitigation techniques. -- 2.2. Distinguish between network design elements and components. -- 2.3. Determine the appropriate use of network security tools to facilitate network security. -- 2.4. Apply the appropriate network tools to facilitate network security. -- 2.5. Explain the vulnerabilities and mitigations associated with network devices. -- 2.6. Explain the vulnerabilities and mitigations associated with various transmission media. -- 2.7. Explain the vulnerabilities and implement mitigations associated with wireless networking. -- xvi 3. Access Control -- 3.1. Identify and apply industry best practices for access control methods. -- 3.2. Explain common access control models and the differences between each. -- 3.3. Organize users and computers into appropriate security groups and roles while distinguishing between appropriate rights and privileges. -- 3.4. Apply appropriate security controls to file and print resources. -- 3.5. Compare and implement logical access control methods. -- 3.6. Summarize the various authentication models and identify the components of each. -- 3.7. Deploy various authentication models and identify the components of each. -- 802.1x -- 3.8. Explain the difference between identification and authentication (identity proofing). -- 3.9. Explain and apply physical access security methods. -- 4. Assessments and Audits -- 4.1. Conduct risk assessments and implement risk mitigation. -- 4.2.Carry out vulnerability assessments using common tools. -- 4.3. Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning. -- 4.4. Use monitoring tools on systems and networks and detect security-related anomalies. -- xviii 4.5. Compare and contrast various types of monitoring methodologies. -- 4.6. Execute proper logging procedures and evaluate the results. -- 4.7. Conduct periodic audits of system security settings. -- 5. Cryptography -- 5.1. Explain general cryptography concepts. -- 5.2. Explain basic hashing concepts and map various algorithms to appropriate applications. -- 5.3. Explain basic encryption concepts and map various algorithms to appropriate applications. -- 3DES -- 5.4. Explain and implement protocols. -- 5.5. Explain core concepts of public key cryptography. -- 5.6. Implement PKI and certificate management. -- xx 6. Organizational Security -- 6.1. Explain redundancy planning and its components. -- 6.2. Implement disaster recovery procedures. -- 6.3. Differentiate between and execute appropriate incident response procedures. -- 6.4. Identify and explain applicable legislation and organizational policies. -- 6.5. Explain the importance of environmental controls. -- 6.6. Explain the concept of and how to reduce the risks of social engineering.
520 ## - SUMMARY, ETC.
Summary, etc. This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You'll find this book to be essential reading if you are studying for Security+ certification and want to get up to speed on the most recent security topics. The CD-ROM contains more than 120 review questions, two bonus exams, electronic flashcards, and a searchable key term database.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic data processing personnel
General subdivision Certification.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Examinations
Form subdivision Study guides.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer technicians
General subdivision Certification
Form subdivision Study guides.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name yomna.nassar
Cataloging process P
First Date, FD (RLIN) 20230531
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process R
First Date, FD (RLIN) 20230531
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Gift collections The Knowledge Hub Library The Knowledge Hub Library 02/25/2021   005.8 ST.C 2009 G.C 191684 02/25/2021 02/25/2021 Books
    Dewey Decimal Classification     Gift collections The Knowledge Hub Library The Knowledge Hub Library 02/25/2021   005.8 ST.C 2009 G.C 191689 02/25/2021 02/25/2021 Books