Search -
Principles of Computer Security CompTIA Security+ and Beyond (Exam SY0-301), Third Edition
Principles of Computer Security CompTIA Security and Beyond Third Edition - Exam SY0-301 Author:Wm. Arthur Conklin, Gregory White, Dwayne Williams, Roger Davis, Chuck Cothren, Corey Schou Written by leaders in the field of IT security higher education, the new edition of this full-color text is revised to cover the 2011 CompTIA Security+ exam. Principles of Computer Security, Third Edition covers the new 2011 CompTIA Security+ exam objectives and provides context for students and aspiring government workers looking to mee... more »t government workforce requirements (DOD 8570). This full-color textbook provides comprehensive coverage of the core principles of information security: system security, network infrastructure, access control, organizational security, and compliance, while also providing 100% coverage of all exam objectives for the CompTIA Security+ certification. The full-color textbook design is well illustrated with photographs and diagrams, and has an engaging, dynamic presentation. The textbook?s teaching elements include sidebar questions, critical-skill building activities, and end-of-chapter student review and assessment. The textbook comes with a student CD-ROM that provides self-assessment software with two complete practice exams and a segment of CompTIA Security+ video training from LearnKey. Principles of Computer Security, Third Edition Features CompTIA Approved Quality Curriculum?CAQC Official content Offers Online Learning Center with: instructor manual, classroom PowerPoint slides, and a test bank solution in EZ Test & Blackboard format Includes student CD-ROM with two complete practice exams and a segment of CompTIA Security+ video training from LearnKey Coverage includes:
Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy« less