Import It All
Books > Computers & Technology > Certification > Security
Principles of Computer Security, Fourth Edition

Principles of Computer Security, Fourth Edition

Product ID: 15085150 Condition: New

Sold Out
Buy in USA

Product Description

Principles of Computer Security, Fourth Edition

<h4><p class="MsoNormal"><span style="font-size:12.0pt;line-height:107%;font-family:"Times New Roman",serif">Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, <span style="white-space:pre"></span>authenticity, or access to any online entitlements included with the product.<o:p></o:p></span></p></h4><h4><br></h4><h4>Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+.</h4><i>Principles of Computer Security, Fourth Edition</i> is a student-tested, introductory computer security textbook that provides comprehensive coverage of computer and network security fundamentals in an engaging and dynamic full-color design. <p></p><p>In addition to teaching key computer security concepts, the textbook also fully prepares you for CompTIA Security+ exam SY0-401 with 100% coverage of all exam objectives. Each chapter begins with a list of topics to be covered and features sidebar exam and tech tips, a chapter summary, and an end-of-chapter assessment section that includes key term, multiple choice, and essay quizzes as well as lab projects. Electronic content includes CompTIA Security+ practice exam questions and a PDF copy of the book.</p><p>Key features:</p><ul><li>CompTIA Approved Quality Content (CAQC) </li><li>Electronic content features two simulated practice exams in the Total Tester exam engine and a PDF eBook </li><li>Supplemented by <em>Principles of Computer Security Lab Manual, Fourth Edition</em>, available separately </li><li>White and Conklin are two of the most well-respected computer security educators in higher education</li><li>Instructor resource materials for adopting instructors include: Instructor Manual, PowerPoint slides featuring artwork from the book, and a test bank of questions for use as quizzes or exams </li><li>Answers to the end of chapter sections are not included in the book and are only available to adopting instructors</li></ul><p>Learn how to:</p><ul><li>Ensure operational, organizational, and physical security</li><li>Use cryptography and public key infrastructures (PKIs)</li><li>Secure remote access, wireless networks, and virtual private networks (VPNs)</li><li>Authenticate users and lock down mobile devices</li><li>Harden network devices, operating systems, and applications</li><li>Prevent network attacks, such as denial of service, spoofing, hijacking, and<br>password guessing</li><li>Combat viruses, worms, Trojan horses, and rootkits</li><li>Manage e-mail, instant messaging, and web security</li><li>Explore secure software development requirements</li><li>Implement disaster recovery and business continuity measures</li><li>Handle computer forensics and incident response</li><li>Understand legal, ethical, and privacy issues</li></ul>

Technical Specifications

Country
USA
Brand
McGraw-Hill Education
Manufacturer
McGraw-Hill Education
Binding
Paperback
ItemPartNumber
illustrations
UnitCount
1
EANs
9780071835978

You might also like

Back to top