Comptia Security+ 2008 in depth / Mark Ciampa.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 1598638130
- 9781598638134
- 005.8 CI.C 2009 G.C 23
- QA76.9.A25 C524 2009
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
The Knowledge Hub Library | Gift collections | 005.8 CI.C 2009 G.C (Browse shelf(Opens below)) | Available | 191686 |
Includes bibliographical references and index.
""Table of Contents""; ""Introduction""; ""CHAPTER 1 Introduction to Security""; ""Challenges of Securing Information""; ""Today�s Security Attacks""; ""Difficulties in Defending against Attacks""; ""What Is Information Security?""; ""Defining Information Security""; ""Information Security Terminology""; ""Understanding the Importance of Information Security""; ""Who Are the Attackers?""; ""Hackers""; ""Script Kiddies""; ""Spies""; ""Employees""; ""Cybercriminals""; ""Cyberterrorists""; ""Attacks and Defenses""; ""Steps of an Attack""; ""Defenses against Attacks""; ""Layering""
LimitingDiversity -- Obscurity -- Simplicity -- Surveying Information Security Careers and the Security+ Certification -- Types of Information Security Jobs -- CompTIA Security+ Certification -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 2 Systems Threats and Risks -- Software-Based Attacks -- Infecting Malware -- Concealing Malware -- Malware for Profit -- Hardware-Based Attacks -- BIOS -- USB Devices -- Network Attached Storage (NAS) -- Cell Phones -- Attacks on Virtualized Systems -- What Is Virtualization?
Attacks on Virtual SystemsChapter Summary -- Key Terms -- Review Questions -- CHAPTER 3 Protecting Systems -- Hardening the Operating System -- Managing Operating System Updates -- Buffer Overflow Protection -- Configuring Operating System Protection -- Preventing Attacks That Target the Web Browser -- Cookies -- JavaScript -- Java -- ActiveX -- Cross Site Scripting (XSS) -- Hardening Web Servers -- Protecting Systems from Communications-Based Attacks -- SMTP Open Relays -- Instant Messaging -- Peer-to-Peer (P2P) Networks
Applying Software Security ApplicationsAntivirus -- Popup Blockers -- Antispam -- Personal Software Firewalls -- Host Intrusion Detection Systems (HIDS) -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 4 Network Vulnerabilities and Attacks -- Network Vulnerabilities -- Media-Based Vulnerabilities -- Network Device Vulnerabilities -- Categories of Attacks -- Denial-of-Service (DoS) -- Spoofing -- Man-in-the-Middle -- Replay -- Methods of Network Attacks -- Protocol-Based Attacks -- Wireless Attacks -- Other Attacks and Frauds
Chapter SummaryKey Terms -- Review Questions -- CHAPTER 5 Network Defenses -- Crafting a Secure Network -- Security through Network Design -- Security through Network Technologies -- Applying Network Security Devices -- Firewall -- Proxy Server -- Honeypot -- Network Intrusion Detection Systems (NIDS) -- Host and Network Intrusion Prevention Systems (HIPS/NIPS) -- Protocol Analyzers -- Internet Content Filters -- Integrated Network Security Hardware -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 6 Wireless Network Security
There are no comments on this title.