Flylib.com
Security + Exam Guide (Charles River Media Networking/Security)
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136
Authors:
Christopher A. Crayton
BUY ON AMAZON
Table of Contents
BackCover
Security Exam Guide-TestTaker s Guide Series
Chapter 1: Introduction
The CompTIA Security Certification Exam
Registering for the Security Exam
Test Site Requirements
The Exam Structure
Preparing Yourself for the Exam
Useful Tools, Tips, and Study Techniques
Book Structure and Sample Review Questions
Chapter Summary
References
Chapter 2: General Security Concepts
Access Control Systems Fundamentals
Authentication
Authorization
Access Control Techniques
Nonessential Services and Protocols
Attack Methods
Security Monitoring
Auditing
Test Tips
Chapter Summary
Review Questions
References
Chapter 3: Communications Security
802.1X
E-mail Security
Web Security
Directory Security
File Transfer
Wireless Security
Test Tips
Chapter Summary
Review Questions
References
Chapter 4: Infrastructure Security
Open Systems Interconnection (OSI) Model and Layers
Network Topology
Network Cabling
Removable Media
Protocols and Services
Intrusion Detection Systems (IDS)
Network Countermeasures
Devices
Security Baselines
Test Tips
Chapter Summary
Review Questions
References
Chapter 5: Basics of Cryptography
Algorithms
Standards and Protocols
Public Key Infrastructure (PKI)
Key Management Certificate Life Cycle
Test Tips
Chapter Summary
Review Questions
References
Chapter 6: OperationalOrganizational Security
Physical Security
Disaster Recovery
Business Continuity
Policies and Procedures
Privilege Management
Forensics
RiskThreat Identification
Education
Test Tips
Chapter Summary
Review Questions
References
Chapter 7: Applications and Systems Development
Applications
Databases
Knowledge-based Systems
System Development
Test Tips
Chapter Summary
Review Questions
References
Chapter 8: Law, Crimes, Ethics, and Investigation
Computer Crime
Illegal Internet Content
Ethics
Internet Architecture Board (IAB)
Investigation
Surveillance
Test Tips
Chapter Summary
Review Questions
References
Chapter 9: Viruses, Worms, Trojans, and Protection
Malicious Code
Specific Computer Viruses
Antivirus Solutions
Operating Systems Security
Test Tips
Chapter Summary
Review Questions
References
The Security Exam Guide TestTaker s Cumulative Practice Exam
Appendix: About the CD-ROM
Installation
General Operation
Keyboard Shortcuts
Glossary
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
Security + Exam Guide (Charles River Media Networking/Security)
ISBN: 1584502517
EAN: 2147483647
Year: 2003
Pages: 136
Authors:
Christopher A. Crayton
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Object Types, Predicates, and Basic Constraints
Mapping ORM Models to Logical Database Models
Reverse Engineering and Importing to ORM
Logical Database Model Reports
Change Propagation and Round Trip Engineering
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Working with Console Applications
Working with the .NET Framework
GDI+
Building Enterprise Services Applications
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 24. Explore a 3-D Model of the Entire World
Hack 42. Map Your Tracklogs on the Web
Hack 43. Map Earthquakes in (Nearly) Real Time
Hack 66. Java-Based Desktop Mapping with Openmap
Hacks 93-100
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 300: Wiring Methods
Article 350 Liquidtight Flexible Metal Conduit Type LFMC
Article 430: Motors, Motor Circuits, and Controllers
Example No. D1(a) One-Family Dwelling
Example No. D10 Feeder Ampacity Determination for Adjustable-Speed Drive Control [See 215.2, 430.24, 620.13, 620.14, 620.61, Tables 430.22(E), and 620.14]
MPLS Configuration on Cisco IOS Software
Command Reference
PE-CE Routing Protocol-Static and RIP
CSC Architecture Benefits
Case Study 5: Implementing Dynamic Layer 3 VPNs Using mGRE Tunnels
Case Study 8: Implementing Hub and Spoke Topologies with EIGRP
Python Standard Library (Nutshell Handbooks) with
The rotor Module
The zipfile Module
The mailbox Module
Overview
The tabnanny Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies