Security administrator street smarts : (Record no. 750)

MARC details
000 -LEADER
fixed length control field 05077cam a2200457 i 4500
001 - CONTROL NUMBER
control field 15451264
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230531145415.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 080916s2009 inua 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008040634
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470404850
Qualifying information paperback
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 047040485X
Qualifying information paperback
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn233544910
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency BTCTA
-- YDXCP
-- C#P
-- BWX
-- DLC
-- EG-CaTKH
Description conventions rda
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.3
Item number .M562 2009
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 MI.S 2009 G.C
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Miller, David,
Dates associated with a name 1959 November 5-
Relator term author.
245 10 - TITLE STATEMENT
Title Security administrator street smarts :
Remainder of title a real world guide to CompTIA Security+ skills /
Statement of responsibility, etc. David R. Miller, Michael Gregg.
250 ## - EDITION STATEMENT
Edition statement Second edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis :
Name of producer, publisher, distributor, manufacturer Wiley ,
Date of production, publication, distribution, manufacture, or copyright notice 2009.
300 ## - PHYSICAL DESCRIPTION
Extent xxxvi, 513 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Sybex serious skills
490 1# - SERIES STATEMENT
Series statement Street smarts series
500 ## - GENERAL NOTE
General note Includes index.
505 00 - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- 1. The Grunt Work of Security -- 1.1. Performing an Initial Risk Assessment -- 1.2. Determining Which Security Policy Is Most Important -- 1.3. Establishing a User-Awareness Program -- 1.4. Reviewing a Physical-Security Checklist -- 1.5. Understanding the Value of Documents -- 2. Hardening Systems -- 2.1. Managing Services -- 2.2. Managing Ports -- 2.3. Patching the Operating System -- 2.4. Security Templates -- 2.5. Securing Autoruns -- 2.6. Securing Hardware Devices -- 2.7. Virtualization -- 3. Malicious Software -- 3.1. Installing, Updating, and Running Antivirus Software -- 3.2. Using a Rootkit Checker -- Criteria for Completion -- 3.3. Using Adware Checker -- 3.4. Using Spyware Checker -- 3.5. Malicious Software Removal Tool -- 3.6. McAfee Site Advisor -- 3.7. ARP Poisoning with Cain & Abel -- 4. Secure Storage -- 4.1. The Encrypting File System -- 4.2. EFS Data Recovery -- 4.3. Implementing Syskey -- 4.4. Converting FAT to NTFS -- 4.5. Implementing Disk Fault Tolerance with RAID -- 4.6. Backing Up Data -- 4.7. Restoring Data from a Backup -- 4.8. Securing Shares -- 4.9. BitLocker Drive Encryption -- 5. Managing User Accounts -- 5.1. Creating User Accounts -- 5.2. Implementing the Password Policy -- 5.3. Auditing Logons -- 5.4. Securing the Default User Accounts -- 5.5. Implementing a Deny Group -- 6. Network Security -- 6.1. Deploying IPSec -- 6.2. Configuring the VPN Server -- 6.3. Configuring the VPN Client -- 6.4. Implementing Secure Remote Administration -- 6.5. Secure Administration Using Run As -- 6.6. Configuring a Packet Filter -- 6.7. Implementing 802.11 Wireless Security -- 6.8. Implementing an IPSec VPN Using AES -- 7. Securing Internet Activity -- 7.1. Configuring Internet Access -- 7.2. Using Internet Explorer Security Zones -- 7.3. Configuring IE for Secure Use of Cookies -- 7.4. Using Internet Connection Sharing -- 7.5. Securing E-mail -- 7.6. Spam Management -- 7.7. Installing and Using a Digital Certificate -- 7.8. Certificate Backup and Management -- 7.9. Performing Secure File Exchange -- 7.10. Validating Downloads and Checking the Hash -- 7.11. Logging and Recording Internet Activity -- 8. Security Testing -- 8.1. Penetration Testing with Nessus -- 8.2. Penetration Testing with Retina -- 8.3. Performing Assessments with MBSA -- 8.4. Performing Security Assessments with HFNetChk -- 8.5. Performing Internet Vulnerability Profiling -- 8.6. Tracking Hostile IPs -- 8.7. Investigating Netcat -- 9. Investigating Incidents -- 9.1. Configuring an Audit Policy for Object Access -- 9.2. Reviewing the Audit Logs -- 9.3. Forcing a Memory Dump -- 9.4. Capturing Packets with the Packet Analyzer: Wireshark -- 9.5. Recovering Previous Versions of Files -- 10. Security Troubleshooting -- 10.1. Booting into Safe Mode -- 10.2. Implementing Last Known Good Configuration -- 10.3. Using System Restore -- 10.4. Sanitizing Media -- 10.5. Implementing a Host-Based Intrusion Detection System.
520 ## - SUMMARY, ETC.
Summary, etc. Updated for the new CompTIA Security+ exam, this book focuses on the latest topics and technologies in the ever-evolving field of IT security and offers you the inside scoop on a variety of scenarios that you can expect to encounter on the job-as well as step-by-step guidance for tackling these tasks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic data processing personnel
General subdivision Certification.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
General subdivision Examinations
Form subdivision Study guides.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Examinations
Form subdivision Study guides.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gregg, Michael
Fuller form of name (Michael C.)
Relator term author.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Serious skills.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Street smarts series.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name yomna.nassar
Cataloging process P
First Date, FD (RLIN) 20230531
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process R
First Date, FD (RLIN) 20230531
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Gift collections The Knowledge Hub Library The Knowledge Hub Library 02/25/2021   005.8 MI.S 2009 G.C 191688 02/25/2021 02/25/2021 Books