Flylib.com
Security + Exam Guide (Charles River Media Networking/Security)
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136
Authors:
Christopher A. Crayton
BUY ON AMAZON
Table of Contents
BackCover
Security Exam Guide-TestTaker s Guide Series
Chapter 1: Introduction
The CompTIA Security Certification Exam
Registering for the Security Exam
Test Site Requirements
The Exam Structure
Preparing Yourself for the Exam
Useful Tools, Tips, and Study Techniques
Book Structure and Sample Review Questions
Chapter Summary
References
Chapter 2: General Security Concepts
Access Control Systems Fundamentals
Authentication
Authorization
Access Control Techniques
Nonessential Services and Protocols
Attack Methods
Security Monitoring
Auditing
Test Tips
Chapter Summary
Review Questions
References
Chapter 3: Communications Security
802.1X
E-mail Security
Web Security
Directory Security
File Transfer
Wireless Security
Test Tips
Chapter Summary
Review Questions
References
Chapter 4: Infrastructure Security
Open Systems Interconnection (OSI) Model and Layers
Network Topology
Network Cabling
Removable Media
Protocols and Services
Intrusion Detection Systems (IDS)
Network Countermeasures
Devices
Security Baselines
Test Tips
Chapter Summary
Review Questions
References
Chapter 5: Basics of Cryptography
Algorithms
Standards and Protocols
Public Key Infrastructure (PKI)
Key Management Certificate Life Cycle
Test Tips
Chapter Summary
Review Questions
References
Chapter 6: OperationalOrganizational Security
Physical Security
Disaster Recovery
Business Continuity
Policies and Procedures
Privilege Management
Forensics
RiskThreat Identification
Education
Test Tips
Chapter Summary
Review Questions
References
Chapter 7: Applications and Systems Development
Applications
Databases
Knowledge-based Systems
System Development
Test Tips
Chapter Summary
Review Questions
References
Chapter 8: Law, Crimes, Ethics, and Investigation
Computer Crime
Illegal Internet Content
Ethics
Internet Architecture Board (IAB)
Investigation
Surveillance
Test Tips
Chapter Summary
Review Questions
References
Chapter 9: Viruses, Worms, Trojans, and Protection
Malicious Code
Specific Computer Viruses
Antivirus Solutions
Operating Systems Security
Test Tips
Chapter Summary
Review Questions
References
The Security Exam Guide TestTaker s Cumulative Practice Exam
Appendix: About the CD-ROM
Installation
General Operation
Keyboard Shortcuts
Glossary
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136
Authors:
Christopher A. Crayton
BUY ON AMAZON
Beginning Cryptography with Java
Certificate Revocation and Path Validation
CMS and S/MIME
SSL and TLS
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
Image Processing with LabVIEW and IMAQ Vision
Image Acquisition
CMOS Image Sensors
Color Images
Spatial Image Filtering
Character Recognition
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Static Library with an IDE
Defining a Macro
Making Sure a Header File Gets Included Only Once
Using XML to Save and Restore a Collection of Objects
Ensuring That a Member Function Doesnt Modify Its Object
MySQL Cookbook
Creating Temporary Tables
Changing a Table Type
Database-Independent Methods of Obtaining Table Information
Introduction
C.4. Python Resources
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
Form Presentation and Validation with Struts
Managing Business Logic with Struts
Building a Data Access Tier with ObjectRelationalBridge
Templates and Velocity
Creating a Search Engine with Lucene
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the Authentication Process
Triggers
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
Accessing the Network
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies