Flylib.com
Security + Exam Guide (Charles River Media Networking/Security)
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136
Authors:
Christopher A. Crayton
BUY ON AMAZON
Table of Contents
BackCover
Security Exam Guide-TestTaker s Guide Series
Chapter 1: Introduction
The CompTIA Security Certification Exam
Registering for the Security Exam
Test Site Requirements
The Exam Structure
Preparing Yourself for the Exam
Useful Tools, Tips, and Study Techniques
Book Structure and Sample Review Questions
Chapter Summary
References
Chapter 2: General Security Concepts
Access Control Systems Fundamentals
Authentication
Authorization
Access Control Techniques
Nonessential Services and Protocols
Attack Methods
Security Monitoring
Auditing
Test Tips
Chapter Summary
Review Questions
References
Chapter 3: Communications Security
802.1X
E-mail Security
Web Security
Directory Security
File Transfer
Wireless Security
Test Tips
Chapter Summary
Review Questions
References
Chapter 4: Infrastructure Security
Open Systems Interconnection (OSI) Model and Layers
Network Topology
Network Cabling
Removable Media
Protocols and Services
Intrusion Detection Systems (IDS)
Network Countermeasures
Devices
Security Baselines
Test Tips
Chapter Summary
Review Questions
References
Chapter 5: Basics of Cryptography
Algorithms
Standards and Protocols
Public Key Infrastructure (PKI)
Key Management Certificate Life Cycle
Test Tips
Chapter Summary
Review Questions
References
Chapter 6: OperationalOrganizational Security
Physical Security
Disaster Recovery
Business Continuity
Policies and Procedures
Privilege Management
Forensics
RiskThreat Identification
Education
Test Tips
Chapter Summary
Review Questions
References
Chapter 7: Applications and Systems Development
Applications
Databases
Knowledge-based Systems
System Development
Test Tips
Chapter Summary
Review Questions
References
Chapter 8: Law, Crimes, Ethics, and Investigation
Computer Crime
Illegal Internet Content
Ethics
Internet Architecture Board (IAB)
Investigation
Surveillance
Test Tips
Chapter Summary
Review Questions
References
Chapter 9: Viruses, Worms, Trojans, and Protection
Malicious Code
Specific Computer Viruses
Antivirus Solutions
Operating Systems Security
Test Tips
Chapter Summary
Review Questions
References
The Security Exam Guide TestTaker s Cumulative Practice Exam
Appendix: About the CD-ROM
Installation
General Operation
Keyboard Shortcuts
Glossary
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136
Authors:
Christopher A. Crayton
BUY ON AMAZON
Snort Cookbook
Logging to a File Quickly
Logging in PCAP Format (TCPDump)
Detecting Malware
Detecting Viruses
Recognizing HTTP Traffic on Unusual Ports
Cisco Voice Gateways and Gatekeepers
Voice Translation Rules and Profiles
Implementing COR
Implementing the AA Tcl Script
Deploying Gatekeepers
Case Study: Deploying Gatekeepers to Assist in Migration to VoIP
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Form Presentation and Validation with Struts
Building a Data Access Tier with ObjectRelationalBridge
Creating a Search Engine with Lucene
Building the JavaEdge Application with Ant and Anthill
Sap Bw: a Step By Step Guide for Bw 2.0
Using BW Monitor
Aggregates and Multi-Cubes
Maintaining InfoCube Data
Performance Tuning
Section A.1. ASAP for BW
.NET-A Complete Development Cycle
Commonly Used Software Development Models
References for Further Reading
Adding 3D Text to the Photo Editor Application
Unit Tests
Secure Web Applications
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Oracle and PL/SQL
Indirect Privilege Escalation
Accessing the Network
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies