1 Networking Basics and Terminology 2 Introduction to Security Terminology 3 Security Policies and Standards 4 Types of Attacks (GC) 5 Vulnerabilities and Threats 6 Mitigating Security Threats 7 Implementing Host-based Security 8 Securing the Network Infrastructure 9 Wireless Networking and Security 10 Authentication 11 Authorization and Access Control 12 Introduction to Cryptography 13 Managing a Public Key Infrastructure 14 Physical Security 15 Application Attacks and Security 16 Virtualization and Cloud Security 17 Risk Analysis 18 Disaster Recovery and Business Continuity 19 Understanding Monitoring and Auditing 20 Security Assessments and Audits 21 Incident Response and Computer Forensics
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Please wait while the item is added to your bag...
×
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description,
with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.