MARC details
000 -LEADER |
fixed length control field |
05077cam a2200457 i 4500 |
001 - CONTROL NUMBER |
control field |
15451264 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230531145415.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
080916s2009 inua 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2008040634 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780470404850 |
Qualifying information |
paperback |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
047040485X |
Qualifying information |
paperback |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn233544910 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
BTCTA |
-- |
YDXCP |
-- |
C#P |
-- |
BWX |
-- |
DLC |
-- |
EG-CaTKH |
Description conventions |
rda |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.3 |
Item number |
.M562 2009 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 MI.S 2009 G.C |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Miller, David, |
Dates associated with a name |
1959 November 5- |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Security administrator street smarts : |
Remainder of title |
a real world guide to CompTIA Security+ skills / |
Statement of responsibility, etc. |
David R. Miller, Michael Gregg. |
250 ## - EDITION STATEMENT |
Edition statement |
Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Indianapolis : |
Name of producer, publisher, distributor, manufacturer |
Wiley , |
Date of production, publication, distribution, manufacture, or copyright notice |
2009. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxvi, 513 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
490 1# - SERIES STATEMENT |
Series statement |
Sybex serious skills |
490 1# - SERIES STATEMENT |
Series statement |
Street smarts series |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 00 - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction -- 1. The Grunt Work of Security -- 1.1. Performing an Initial Risk Assessment -- 1.2. Determining Which Security Policy Is Most Important -- 1.3. Establishing a User-Awareness Program -- 1.4. Reviewing a Physical-Security Checklist -- 1.5. Understanding the Value of Documents -- 2. Hardening Systems -- 2.1. Managing Services -- 2.2. Managing Ports -- 2.3. Patching the Operating System -- 2.4. Security Templates -- 2.5. Securing Autoruns -- 2.6. Securing Hardware Devices -- 2.7. Virtualization -- 3. Malicious Software -- 3.1. Installing, Updating, and Running Antivirus Software -- 3.2. Using a Rootkit Checker -- Criteria for Completion -- 3.3. Using Adware Checker -- 3.4. Using Spyware Checker -- 3.5. Malicious Software Removal Tool -- 3.6. McAfee Site Advisor -- 3.7. ARP Poisoning with Cain & Abel -- 4. Secure Storage -- 4.1. The Encrypting File System -- 4.2. EFS Data Recovery -- 4.3. Implementing Syskey -- 4.4. Converting FAT to NTFS -- 4.5. Implementing Disk Fault Tolerance with RAID -- 4.6. Backing Up Data -- 4.7. Restoring Data from a Backup -- 4.8. Securing Shares -- 4.9. BitLocker Drive Encryption -- 5. Managing User Accounts -- 5.1. Creating User Accounts -- 5.2. Implementing the Password Policy -- 5.3. Auditing Logons -- 5.4. Securing the Default User Accounts -- 5.5. Implementing a Deny Group -- 6. Network Security -- 6.1. Deploying IPSec -- 6.2. Configuring the VPN Server -- 6.3. Configuring the VPN Client -- 6.4. Implementing Secure Remote Administration -- 6.5. Secure Administration Using Run As -- 6.6. Configuring a Packet Filter -- 6.7. Implementing 802.11 Wireless Security -- 6.8. Implementing an IPSec VPN Using AES -- 7. Securing Internet Activity -- 7.1. Configuring Internet Access -- 7.2. Using Internet Explorer Security Zones -- 7.3. Configuring IE for Secure Use of Cookies -- 7.4. Using Internet Connection Sharing -- 7.5. Securing E-mail -- 7.6. Spam Management -- 7.7. Installing and Using a Digital Certificate -- 7.8. Certificate Backup and Management -- 7.9. Performing Secure File Exchange -- 7.10. Validating Downloads and Checking the Hash -- 7.11. Logging and Recording Internet Activity -- 8. Security Testing -- 8.1. Penetration Testing with Nessus -- 8.2. Penetration Testing with Retina -- 8.3. Performing Assessments with MBSA -- 8.4. Performing Security Assessments with HFNetChk -- 8.5. Performing Internet Vulnerability Profiling -- 8.6. Tracking Hostile IPs -- 8.7. Investigating Netcat -- 9. Investigating Incidents -- 9.1. Configuring an Audit Policy for Object Access -- 9.2. Reviewing the Audit Logs -- 9.3. Forcing a Memory Dump -- 9.4. Capturing Packets with the Packet Analyzer: Wireshark -- 9.5. Recovering Previous Versions of Files -- 10. Security Troubleshooting -- 10.1. Booting into Safe Mode -- 10.2. Implementing Last Known Good Configuration -- 10.3. Using System Restore -- 10.4. Sanitizing Media -- 10.5. Implementing a Host-Based Intrusion Detection System. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Updated for the new CompTIA Security+ exam, this book focuses on the latest topics and technologies in the ever-evolving field of IT security and offers you the inside scoop on a variety of scenarios that you can expect to encounter on the job-as well as step-by-step guidance for tackling these tasks. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Electronic data processing personnel |
General subdivision |
Certification. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
General subdivision |
Examinations |
Form subdivision |
Study guides. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures |
-- |
Examinations |
Form subdivision |
Study guides. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Gregg, Michael |
Fuller form of name |
(Michael C.) |
Relator term |
author. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Serious skills. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Street smarts series. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
yomna.nassar |
Cataloging process |
P |
First Date, FD (RLIN) |
20230531 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
R |
First Date, FD (RLIN) |
20230531 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |