Principles of Computer Security CompTIA Security+ and Beyond (Exam SY0-301), 3rd Edition
, by Conklin, Wm. Arthur; White, Gregory; Williams, Dwayne; Davis, Roger; Cothren, Chuck; Schou, CoreyNote: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9780071786195 | 0071786198
- Cover: Paperback
- Copyright: 12/19/2011
Written by leaders in the field of IT security higher education, the new edition of this full-color text is revised to cover the 2011 CompTIA Security+ exam. Principles of Computer Security, Third Editioncovers the new 2011 CompTIA Security+ exam objectives and provides context for students and aspiring government workers looking to meet government workforce requirements (DOD 8570). This full-color textbook provides comprehensive coverage of the core principles of information security: system security, network infrastructure, access control, organizational security, and compliance, while also providing 100% coverage of all exam objectives for the CompTIA Security+ certification. The full-color textbook design is well illustrated with photographs and diagrams, and has an engaging, dynamic presentation. The textbook's teaching elements include sidebar questions, critical-skill building activities, and end-of-chapter student review and assessment. The textbook comes with a student CD-ROM that provides self-assessment software with two complete practice exams and a segment of CompTIA Security+ video training from LearnKey. Principles of Computer Security, Third Edition Features CompTIA Approved Quality CurriculumCAQC Official content Offers Online Learning Center with: instructor manual, classroom PowerPoint slides, and a test bank solution in EZ Test & Blackboard format Includes student CD-ROM with two complete practice exams and a segment of CompTIA Security+ video training from LearnKey Coverage includes: Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy