Mindtap Course List Ser.: CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) by Mark Ciampa (2014, Trade Paperback / Mixed Lot)

ThriftBooks (3907004)
98.9% positive Feedback
Price:
US $6.89
Approximately£5.08
+ $22.87 postage
Estimated delivery Mon, 16 Jun - Mon, 23 Jun
Returns:
No returns, but backed by the eBay Money Back Guarantee. Policy depends on postage service.
Condition:
Very Good
Comptia Security+ Guide to Network Security Fundamentals (with Certblaster Printed Access Card) by Ciampa, Mark May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less

About this product

Product Identifiers

PublisherCengage Learning
ISBN-101305093917
ISBN-139781305093911
eBay Product ID (ePID)203426614

Product Key Features

Number of Pages608 Pages
Publication NameComptia Security+ Guide to Network Security Fundamentals (With Certblaster Printed Access Card)
LanguageEnglish
SubjectSecurity / General, Security / Networking, Tests
Publication Year2014
TypeTextbook
AuthorMark Ciampa
Subject AreaComputers, Study Aids
SeriesMindtap Course List Ser.
FormatTrade Paperback / Mixed Lot

Dimensions

Item Height9.1 in
Item Weight44 Oz
Item Length1.7 in
Item Width7.2 in

Additional Product Features

Edition Number5
Intended AudienceCollege Audience
LCCN2016-303893
ReviewsThe introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent., I was especially impressed by the information in Chapter 14 regarding policies. The chapter leaves the reader with a good understanding of how, why, and when to create policies, along with how to implement them into an organization., The end of the chapter hands on projects are great and the support the concepts in the chapter as a whole. The chapter does prepare the student to complete all the end of chapter projects., Chapter 13 does a good job discussing many different redundancy based technologies and it also excels in keepting the discussions pointed and brief., Ch 12 does a great job of taking an age old security topic like passwords, and putting an interesting spin on it in ways that students will be able to relate to.
Dewey Edition22
IllustratedYes
Dewey Decimal005.8
Edition DescriptionTeacher's edition
Table Of ContentPart I: INTRODUCTION.1. Introduction to Security.Part II: THREATS.2. Malware and Social Engineering Attacks.3. Application and Networking-Based Attacks.Part III: BASIC SECURITY.4. Host, Application, and Data Security.Part IV: CRYPTOGRAPHY.5. Basic Cryptography.6. Advanced Cryptography.Part V: NETWORK SECURITY.7. Network Security.8. Administering a Secure Network.Part VI: MOBILE SECURITY.9. Wireless Network Security.10. Mobile Device Security.Part VII: ACCESS CONTROL AND IDENTITY MANAGEMENT. 11. Access Control Fundamentals.12. Authentication and Account Management.Part VIII: COMPLIANCE & OPERATIONAL SECURITY.13. Business Continuity.14. Risk Mitigation.15. Vulnerability Assessment and Third Party Integration.
SynopsisThis best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security+ SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional certification and career success. The text covers the essentials of network security, including compliance and operational security; threats and vulnerabilities; application, data, and host security; access control and identity management; and cryptography. The extensively updated Fifth Edition features a new structure based on major domains, a new chapter dedicated to mobile device security, expanded coverage of attacks and defenses, and new and updated information reflecting recent developments and emerging trends in information security, such as virtualization. New hands-on and case activities help readers review and apply what they have learned, and end-of-chapter exercises direct readers to the Information Security Community Site for additional activities and a wealth of learning resources, including blogs, videos, and current news and information relevant to the information security field.
LC Classification NumberTK5105.59

All listings for this product

Buy it now
Any condition
New
Pre-owned

Ratings and reviews

5.0
6 product ratings
  • 6 users rated this 5 out of 5 stars
  • 0 users rated this 4 out of 5 stars
  • 0 users rated this 3 out of 5 stars
  • 0 users rated this 2 out of 5 stars
  • 0 users rated this 1 out of 5 stars

Would recommend

Good value

Compelling content

Most relevant reviews

  • Nothing wrong with book and has everythi...

    Nothing wrong with book and has everything I needed

    Verified purchase: YesCondition: Pre-owned

  • Explanatory

    Verified purchase: YesCondition: New