Flylib.com
Security + Exam Guide (Charles River Media Networking/Security)
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136
Authors:
Christopher A. Crayton
BUY ON AMAZON
Table of Contents
BackCover
Security Exam Guide-TestTaker s Guide Series
Chapter 1: Introduction
The CompTIA Security Certification Exam
Registering for the Security Exam
Test Site Requirements
The Exam Structure
Preparing Yourself for the Exam
Useful Tools, Tips, and Study Techniques
Book Structure and Sample Review Questions
Chapter Summary
References
Chapter 2: General Security Concepts
Access Control Systems Fundamentals
Authentication
Authorization
Access Control Techniques
Nonessential Services and Protocols
Attack Methods
Security Monitoring
Auditing
Test Tips
Chapter Summary
Review Questions
References
Chapter 3: Communications Security
802.1X
E-mail Security
Web Security
Directory Security
File Transfer
Wireless Security
Test Tips
Chapter Summary
Review Questions
References
Chapter 4: Infrastructure Security
Open Systems Interconnection (OSI) Model and Layers
Network Topology
Network Cabling
Removable Media
Protocols and Services
Intrusion Detection Systems (IDS)
Network Countermeasures
Devices
Security Baselines
Test Tips
Chapter Summary
Review Questions
References
Chapter 5: Basics of Cryptography
Algorithms
Standards and Protocols
Public Key Infrastructure (PKI)
Key Management Certificate Life Cycle
Test Tips
Chapter Summary
Review Questions
References
Chapter 6: OperationalOrganizational Security
Physical Security
Disaster Recovery
Business Continuity
Policies and Procedures
Privilege Management
Forensics
RiskThreat Identification
Education
Test Tips
Chapter Summary
Review Questions
References
Chapter 7: Applications and Systems Development
Applications
Databases
Knowledge-based Systems
System Development
Test Tips
Chapter Summary
Review Questions
References
Chapter 8: Law, Crimes, Ethics, and Investigation
Computer Crime
Illegal Internet Content
Ethics
Internet Architecture Board (IAB)
Investigation
Surveillance
Test Tips
Chapter Summary
Review Questions
References
Chapter 9: Viruses, Worms, Trojans, and Protection
Malicious Code
Specific Computer Viruses
Antivirus Solutions
Operating Systems Security
Test Tips
Chapter Summary
Review Questions
References
The Security Exam Guide TestTaker s Cumulative Practice Exam
Appendix: About the CD-ROM
Installation
General Operation
Keyboard Shortcuts
Glossary
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136
Authors:
Christopher A. Crayton
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
The /proc Filesystem
Key Terms and Concepts
Lock Files
Key Terms and Concepts
C.4. Some RPC Examples
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Eleven Gaining Access to People with Power
Chapter Twelve Controlling the Buying Process
Chapter Fourteen Getting Started with the Process
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
Appendix B Solution Selling: A Scalable Approach
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #3: Work Together for Maximum Gain
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
Comparing, Designing, and Deploying VPNs
Deploying Site-to-Site and Remote Access VPNs: A Comparison
Summary
Advantages and Disadvantages of MPLS Layer 3 VPNs
Summary
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the Authentication Process
Triggers
Running Operating System Commands
Appendix A Default Usernames and Passwords
MPLS Configuration on Cisco IOS Software
Cell-Mode MPLS
Frame-Mode MPLS Configuration and Verification
MPLS VPN Routing Model
Case Study-Hub and Spoke MPLS VPN Network with Sites Using Same AS Numbers
Case Study-Inter-AS Implementing Route-Reflector and BGP Confederation in Provider Networks
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies