9781260026016-1260026019-Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition

Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition

FREE US shipping
Rent
35 days
from $13.54 USD
FREE shipping on RENTAL RETURNS
Buy

From $31.87

Rent

From $13.54

Summary

Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (ISBN-13: 9781260026016 and ISBN-10: 1260026019), written by authors Wm. Arthur Conklin, Chuck Cothren, Roger Davis, Dwayne Williams, Greg White, was published by McGraw Hill in 2018. With an overall rating of 4.0 stars, it's a notable title among other Security Certifications (Security & Encryption, Internet, Groupware, & Telecommunications, Networking & Cloud Computing, Network Security, Internet & Social Media, Privacy & Online Safety, Computer Certification) books. You can easily purchase or rent Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition (Paperback, Used) from BooksRun, along with many other new and used Security Certifications books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $7.45.

Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Fully updated computer security essentials―quality approved by CompTIA

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written by a pair of highly respected security educators, Principles of Computer Security: CompTIA Security+® and Beyond, Fifth Edition (Exam SY0-501) will help you pass the exam and become a CompTIA certified computer security expert.

Find out how to:

•Ensure operational, organizational, and physical security

•Use cryptography and public key infrastructures (PKIs)

•Secure remote access, wireless networks, and virtual private networks (VPNs)

•Authenticate users and lock down mobile devices

•Harden network devices, operating systems, and applications

•Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing

•Combat viruses, worms, Trojan horses, and rootkits

•Manage e-mail, instant messaging, and web security

•Explore secure software development requirements

•Implement disaster recovery and business continuity measures

•Handle computer forensics and incident response

•Understand legal, ethical, and privacy issues

The CD-ROM features:

•Test engine that provides full-length practice exams and customized quizzes by chapter or exam objective

•PDF copy of the book

Each chapter includes:

•Learning objectives

•Real-world examples

•Try This! and Cross Check exercises

•Tech Tips, Notes, and Warnings

•Exam Tips

•End-of-chapter quizzes and lab projects

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book