Principles of computer security : CompTIA security+ and beyond / Wm. Arthur Conklin, Gregory White.

By: Conklin, Wm. ArthurContributor(s): White, Gregory BPublisher: San Francisco, CA : McGraw-Hill Companies, 2010Edition: 2nd edDescription: 665pISBN: 9780071633758 (alk. paper)Subject(s): Computer networks -- Examinations | Computer technicians -- Certification | Electronic data processing personnel -- CertificationDDC classification: 005.8,CON
Contents:
Intoduction and security trends (Page-1), General security concepts (Page-19), Operational organizational security (Page-43), The role of people in security (Page-63), Cryptography (Page-77), Public key infrastructure (Page-107), Standards and protocols (Page-153), The impact of physical security on network security (Page-181), Network fundamentals (Page-195), Infrastructure security (Page-215), Remote access (Page-257), Wireless and instant messaging (Page-287), Intrusion detection system (Page-309), Security baselines (Page-337), Attacks and malware (Page-395), E-mail (Page-423), Web components (Page-439), Software development (Page-469), Disaster recovery ,business continuity and organizational policies (Page-483), Risk management (Page-511), Change management (Page-533), Previlege management (Page-549), Computer forensics (Page-569),Security and Law (Page-587).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,CON (Browse shelf) Link to resource Available Almirah No.8, Shelf No.6 MCS32319
Total holds: 0

Intoduction and security trends (Page-1), General security concepts (Page-19), Operational organizational security (Page-43), The role of people in security (Page-63), Cryptography (Page-77), Public key infrastructure (Page-107), Standards and protocols (Page-153), The impact of physical security on network security (Page-181), Network fundamentals (Page-195), Infrastructure security (Page-215), Remote access (Page-257), Wireless and instant messaging (Page-287), Intrusion detection system (Page-309), Security baselines (Page-337), Attacks and malware (Page-395), E-mail (Page-423), Web components (Page-439), Software development (Page-469), Disaster recovery ,business continuity and organizational policies (Page-483), Risk management (Page-511), Change management (Page-533), Previlege management (Page-549), Computer forensics (Page-569),Security and Law (Page-587).

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.