LCCN2016-303893
ReviewsThe introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent., I was especially impressed by the information in Chapter 14 regarding policies. The chapter leaves the reader with a good understanding of how, why, and when to create policies, along with how to implement them into an organization., The end of the chapter hands on projects are great and the support the concepts in the chapter as a whole. The chapter does prepare the student to complete all the end of chapter projects., Chapter 13 does a good job discussing many different redundancy based technologies and it also excels in keepting the discussions pointed and brief., Ch 12 does a great job of taking an age old security topic like passwords, and putting an interesting spin on it in ways that students will be able to relate to.
Table Of ContentPart I: INTRODUCTION.1. Introduction to Security.Part II: THREATS.2. Malware and Social Engineering Attacks.3. Application and Networking-Based Attacks.Part III: BASIC SECURITY.4. Host, Application, and Data Security.Part IV: CRYPTOGRAPHY.5. Basic Cryptography.6. Advanced Cryptography.Part V: NETWORK SECURITY.7. Network Security.8. Administering a Secure Network.Part VI: MOBILE SECURITY.9. Wireless Network Security.10. Mobile Device Security.Part VII: ACCESS CONTROL AND IDENTITY MANAGEMENT. 11. Access Control Fundamentals.12. Authentication and Account Management.Part VIII: COMPLIANCE & OPERATIONAL SECURITY.13. Business Continuity.14. Risk Mitigation.15. Vulnerability Assessment and Third Party Integration.
SynopsisThis best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security+ SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional certification and career success. The text covers the essentials of network security, including compliance and operational security; threats and vulnerabilities; application, data, and host security; access control and identity management; and cryptography. The extensively updated Fifth Edition features a new structure based on major domains, a new chapter dedicated to mobile device security, expanded coverage of attacks and defenses, and new and updated information reflecting recent developments and emerging trends in information security, such as virtualization. New hands-on and case activities help readers review and apply what they have learned, and end-of-chapter exercises direct readers to the Information Security Community Site for additional activities and a wealth of learning resources, including blogs, videos, and current news and information relevant to the information security field.