Amazon cover image
Image from Amazon.com

Comptia Security+ 2008 in depth / Mark Ciampa.

By: Material type: TextTextPublisher: Boston : Course Technology, 2009Description: xvii, 444 pages : illustrations ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 1598638130
  • 9781598638134
Subject(s): DDC classification:
  • 005.8 CI.C 2009 G.C 23
LOC classification:
  • QA76.9.A25 C524 2009
Contents:
""Table of Contents""; ""Introduction""; ""CHAPTER 1 Introduction to Security""; ""Challenges of Securing Information""; ""Today�s Security Attacks""; ""Difficulties in Defending against Attacks""; ""What Is Information Security?""; ""Defining Information Security""; ""Information Security Terminology""; ""Understanding the Importance of Information Security""; ""Who Are the Attackers?""; ""Hackers""; ""Script Kiddies""; ""Spies""; ""Employees""; ""Cybercriminals""; ""Cyberterrorists""; ""Attacks and Defenses""; ""Steps of an Attack""; ""Defenses against Attacks""; ""Layering""
LimitingDiversity -- Obscurity -- Simplicity -- Surveying Information Security Careers and the Security+ Certification -- Types of Information Security Jobs -- CompTIA Security+ Certification -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 2 Systems Threats and Risks -- Software-Based Attacks -- Infecting Malware -- Concealing Malware -- Malware for Profit -- Hardware-Based Attacks -- BIOS -- USB Devices -- Network Attached Storage (NAS) -- Cell Phones -- Attacks on Virtualized Systems -- What Is Virtualization?
Attacks on Virtual SystemsChapter Summary -- Key Terms -- Review Questions -- CHAPTER 3 Protecting Systems -- Hardening the Operating System -- Managing Operating System Updates -- Buffer Overflow Protection -- Configuring Operating System Protection -- Preventing Attacks That Target the Web Browser -- Cookies -- JavaScript -- Java -- ActiveX -- Cross Site Scripting (XSS) -- Hardening Web Servers -- Protecting Systems from Communications-Based Attacks -- SMTP Open Relays -- Instant Messaging -- Peer-to-Peer (P2P) Networks
Applying Software Security ApplicationsAntivirus -- Popup Blockers -- Antispam -- Personal Software Firewalls -- Host Intrusion Detection Systems (HIDS) -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 4 Network Vulnerabilities and Attacks -- Network Vulnerabilities -- Media-Based Vulnerabilities -- Network Device Vulnerabilities -- Categories of Attacks -- Denial-of-Service (DoS) -- Spoofing -- Man-in-the-Middle -- Replay -- Methods of Network Attacks -- Protocol-Based Attacks -- Wireless Attacks -- Other Attacks and Frauds
Chapter SummaryKey Terms -- Review Questions -- CHAPTER 5 Network Defenses -- Crafting a Secure Network -- Security through Network Design -- Security through Network Technologies -- Applying Network Security Devices -- Firewall -- Proxy Server -- Honeypot -- Network Intrusion Detection Systems (NIDS) -- Host and Network Intrusion Prevention Systems (HIPS/NIPS) -- Protocol Analyzers -- Internet Content Filters -- Integrated Network Security Hardware -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 6 Wireless Network Security
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Gift collections 005.8 CI.C 2009 G.C (Browse shelf(Opens below)) Available 191686

Includes bibliographical references and index.

""Table of Contents""; ""Introduction""; ""CHAPTER 1 Introduction to Security""; ""Challenges of Securing Information""; ""Today�s Security Attacks""; ""Difficulties in Defending against Attacks""; ""What Is Information Security?""; ""Defining Information Security""; ""Information Security Terminology""; ""Understanding the Importance of Information Security""; ""Who Are the Attackers?""; ""Hackers""; ""Script Kiddies""; ""Spies""; ""Employees""; ""Cybercriminals""; ""Cyberterrorists""; ""Attacks and Defenses""; ""Steps of an Attack""; ""Defenses against Attacks""; ""Layering""

LimitingDiversity -- Obscurity -- Simplicity -- Surveying Information Security Careers and the Security+ Certification -- Types of Information Security Jobs -- CompTIA Security+ Certification -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 2 Systems Threats and Risks -- Software-Based Attacks -- Infecting Malware -- Concealing Malware -- Malware for Profit -- Hardware-Based Attacks -- BIOS -- USB Devices -- Network Attached Storage (NAS) -- Cell Phones -- Attacks on Virtualized Systems -- What Is Virtualization?

Attacks on Virtual SystemsChapter Summary -- Key Terms -- Review Questions -- CHAPTER 3 Protecting Systems -- Hardening the Operating System -- Managing Operating System Updates -- Buffer Overflow Protection -- Configuring Operating System Protection -- Preventing Attacks That Target the Web Browser -- Cookies -- JavaScript -- Java -- ActiveX -- Cross Site Scripting (XSS) -- Hardening Web Servers -- Protecting Systems from Communications-Based Attacks -- SMTP Open Relays -- Instant Messaging -- Peer-to-Peer (P2P) Networks

Applying Software Security ApplicationsAntivirus -- Popup Blockers -- Antispam -- Personal Software Firewalls -- Host Intrusion Detection Systems (HIDS) -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 4 Network Vulnerabilities and Attacks -- Network Vulnerabilities -- Media-Based Vulnerabilities -- Network Device Vulnerabilities -- Categories of Attacks -- Denial-of-Service (DoS) -- Spoofing -- Man-in-the-Middle -- Replay -- Methods of Network Attacks -- Protocol-Based Attacks -- Wireless Attacks -- Other Attacks and Frauds

Chapter SummaryKey Terms -- Review Questions -- CHAPTER 5 Network Defenses -- Crafting a Secure Network -- Security through Network Design -- Security through Network Technologies -- Applying Network Security Devices -- Firewall -- Proxy Server -- Honeypot -- Network Intrusion Detection Systems (NIDS) -- Host and Network Intrusion Prevention Systems (HIPS/NIPS) -- Protocol Analyzers -- Internet Content Filters -- Integrated Network Security Hardware -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 6 Wireless Network Security

There are no comments on this title.

to post a comment.