000 03345nam a22004217a 4500
999 _c82179
_d82179
003 CITU
005 20220809110614.0
008 101222s2011 nyua fb 001 0 eng
020 _a9780071836555
040 _aCITU LRAC
_cDLC
_dDLC
_beng
041 _aeng
042 _apcc
050 0 0 _aQA76.9.A25
_bC6555 2015
082 0 0 _a005.8
_222
084 _aCOM055000
_2bisacsh
100 1 _aNestler, Vincent J.
_eauthor
245 0 0 _aPrinciples of computer security :
_blab manual /
_cVincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Art Conklin.
250 _aFourth edition
264 1 _aNew York :
_bMcGraw-Hill Education ,
_c[2015]
264 4 _cc2015
300 _axxiii, 360 pages. :
_c28 cm.
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
500 _aRev. ed. of: Computer security lab manual. c2006.
504 _aIncludes bibliographical references and index.
520 _a"Written by leading IT security educators, this fully updated lab manual supplements Principles of Computer Security: CompTIA Security+ and Beyond, second edition. Principles of Computer Security Lab Manual, second edition, contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence to Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition.The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the key term quiz helps to build vocabulary. Principles of Computer Security Lab Manual, second edition, features: new, more dynamic design and a larger trim size, the real-world, hands-on practice you need to pass the certification exam and succeed on the job Lab solutions on the textbook OLC (Online Learning Center). All-inclusive coverage: Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy"--
_cProvided by publisher.
650 0 _aComputer security
_xManagement
_vHandbooks, manuals, etc.
650 0 _aData protection
_vHandbooks, manuals, etc.
650 7 _aCOMPUTERS / Certification Guides / General
_2bisacsh.
700 1 _aHarrison, Keith
_eauthor
700 1 _aHirsch, Matthew
_eauthor
700 1 _aConklin, Wm. Art
_eauthor
730 0 _aComputer security lab manual.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK