Principles of Computer Security, Fourth Edition (Official Comptia Guide)
<h4>Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+.</h4> <i>Principles of Computer Security, Fourth Edition</i> is a student-tested, introductory computer security textbook that provides comprehensive coverage of computer and network security fundamentals in an engaging and dynamic full-color design. <p></p> <p>In addition to teaching key computer security concepts, the textbook also fully prepares you for CompTIA Security+ exam SY0-401 with 100% coverage of all exam objectives. Each chapter begins with a list of topics to be covered and features sidebar exam and tech tips, a chapter summary, and an end-of-chapter assessment section that includes key term, multiple choice, and essay quizzes as well as lab projects. Electronic content includes CompTIA Security+ practice exam questions and a PDF copy of the book.</p> <p>Key features:</p> <ul><li>CompTIA Approved Quality Content (CAQC)</li> <li>Electronic content features two simulated practice exams in the Total Tester exam engine and a PDF eBook</li> <li>Supplemented by <em>Principles of Computer Security Lab Manual, Fourth Edition</em>, available separately</li> <li>White and Conklin are two of the most well-respected computer security educators in higher education</li> <li>Instructor resource materials for adopting instructors include: Instructor Manual, PowerPoint slides featuring artwork from the book, and a test bank of questions for use as quizzes or exams</li> <li>Answers to the end of chapter sections are not included in the book and are only available to adopting instructors</li> </ul> <p>Learn how to:</p> <ul><li>Ensure operational, organizational, and physical security</li> <li>Use cryptography and public key infrastructures (PKIs)</li> <li>Secure remote access, wireless networks, and virtual private networks (VPNs)</li> <li>Authenticate users and lock down mobile devices</li> <li>Harden network devices, operating systems, and applications</li> <li>Prevent network attacks, such as denial of service, spoofing, hijacking, and<br /><br />password guessing</li> <li>Combat viruses, worms, Trojan horses, and rootkits</li> <li>Manage e-mail, instant messaging, and web security</li> <li>Explore secure software development requirements</li> <li>Implement disaster recovery and business continuity measures</li> <li>Handle computer forensics and incident response</li> <li>Understand legal, ethical, and privacy issues</li> </ul>