Comptia Security+ 2008 in depth / Mark Ciampa.
Material type: TextPublisher: Boston : Course Technology, 2009Description: xvii, 444 pages : illustrations ; 23 cmContent type:- text
- unmediated
- volume
- 1598638130
- 9781598638134
- 005.8 CI.C 2009 G.C 23
- QA76.9.A25 C524 2009
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | The Knowledge Hub Library | Gift collections | 005.8 CI.C 2009 G.C (Browse shelf(Opens below)) | Available | 191686 |
Browsing The Knowledge Hub Library shelves, Collection: Gift collections Close shelf browser (Hides shelf browser)
005.74 WI.B 2005 G.C Building the data warehouse / | 005.8 BA.S 2009 G.C Securing PHP web applications / | 005.8 BO.I 2009 G.C Information security and privacy : 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009 : proceedings / | 005.8 CI.C 2009 G.C Comptia Security+ 2008 in depth / | 005.8 CO.C 2004 G.C Cryptography for dummies / | 005.8 CO.N 2003 G.C Network security for dummies / | 005.8 DU.C 2009 G.C CompTIA security+ study guide / |
Includes bibliographical references and index.
""Table of Contents""; ""Introduction""; ""CHAPTER 1 Introduction to Security""; ""Challenges of Securing Information""; ""Today�s Security Attacks""; ""Difficulties in Defending against Attacks""; ""What Is Information Security?""; ""Defining Information Security""; ""Information Security Terminology""; ""Understanding the Importance of Information Security""; ""Who Are the Attackers?""; ""Hackers""; ""Script Kiddies""; ""Spies""; ""Employees""; ""Cybercriminals""; ""Cyberterrorists""; ""Attacks and Defenses""; ""Steps of an Attack""; ""Defenses against Attacks""; ""Layering""
LimitingDiversity -- Obscurity -- Simplicity -- Surveying Information Security Careers and the Security+ Certification -- Types of Information Security Jobs -- CompTIA Security+ Certification -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 2 Systems Threats and Risks -- Software-Based Attacks -- Infecting Malware -- Concealing Malware -- Malware for Profit -- Hardware-Based Attacks -- BIOS -- USB Devices -- Network Attached Storage (NAS) -- Cell Phones -- Attacks on Virtualized Systems -- What Is Virtualization?
Attacks on Virtual SystemsChapter Summary -- Key Terms -- Review Questions -- CHAPTER 3 Protecting Systems -- Hardening the Operating System -- Managing Operating System Updates -- Buffer Overflow Protection -- Configuring Operating System Protection -- Preventing Attacks That Target the Web Browser -- Cookies -- JavaScript -- Java -- ActiveX -- Cross Site Scripting (XSS) -- Hardening Web Servers -- Protecting Systems from Communications-Based Attacks -- SMTP Open Relays -- Instant Messaging -- Peer-to-Peer (P2P) Networks
Applying Software Security ApplicationsAntivirus -- Popup Blockers -- Antispam -- Personal Software Firewalls -- Host Intrusion Detection Systems (HIDS) -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 4 Network Vulnerabilities and Attacks -- Network Vulnerabilities -- Media-Based Vulnerabilities -- Network Device Vulnerabilities -- Categories of Attacks -- Denial-of-Service (DoS) -- Spoofing -- Man-in-the-Middle -- Replay -- Methods of Network Attacks -- Protocol-Based Attacks -- Wireless Attacks -- Other Attacks and Frauds
Chapter SummaryKey Terms -- Review Questions -- CHAPTER 5 Network Defenses -- Crafting a Secure Network -- Security through Network Design -- Security through Network Technologies -- Applying Network Security Devices -- Firewall -- Proxy Server -- Honeypot -- Network Intrusion Detection Systems (NIDS) -- Host and Network Intrusion Prevention Systems (HIPS/NIPS) -- Protocol Analyzers -- Internet Content Filters -- Integrated Network Security Hardware -- Chapter Summary -- Key Terms -- Review Questions -- CHAPTER 6 Wireless Network Security
There are no comments on this title.