Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition

Conklin, Wm. Arthur; White, Greg; Cothren, Chuck; Davis, Roger L.; Williams, Dwayne

 
9781260026016: Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition

Synopsis

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


Fully updated computer security essentials―quality approved by CompTIA

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written by a pair of highly respected security educators, Principles of Computer Security: CompTIA Security+® and Beyond, Fifth Edition (Exam SY0-501) will help you pass the exam and become a CompTIA certified computer security expert.

Find out how to:

Ensure operational, organizational, and physical security

Use cryptography and public key infrastructures (PKIs)

Secure remote access, wireless networks, and virtual private networks (VPNs)

Authenticate users and lock down mobile devices

Harden network devices, operating systems, and applications

Prevent network attacks, such as denial of service, spoofing, hijacking, and password guessing

Combat viruses, worms, Trojan horses, and rootkits

Manage e-mail, instant messaging, and web security

Explore secure software development requirements

Implement disaster recovery and business continuity measures

Handle computer forensics and incident response

Understand legal, ethical, and privacy issues

The CD-ROM features:

Test engine that provides full-length practice exams and customized quizzes by chapter or exam objective

PDF copy of the book

Each chapter includes:

Learning objectives

Real-world examples

Try This! and Cross Check exercises

Tech Tips, Notes, and Warnings

Exam Tips

End-of-chapter quizzes and lab projects




"synopsis" may belong to another edition of this title.

About the Authors

Chuck Cothren is a Research Scientist at University of Texas at San Antonio (UTSA) Center for Infrastructure Assurance and Security (CIAS) and currently serves on theInformation Security Association’s Alamo Chapter Board of Directors. Mr. Cothren has a wide array of security experience including performing controlled penetration testing, network security policies, computer intrusionforensics, and computer training. He is a Certified Information Systems Security Professional (CISSP) and has co-authored other McGraw-Hill/Osborne titles. Mr. Cothren holds a B.S. in Industrial Distribution from Texas A&M University.

Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklin’s interests are information security, systems theory, and secure software design.

Roger L. Davis is a Senior Internal Audit Manager at NuSkinEnterprises and is responsible for evaluating global business operations in over 35 countries. He is a retired Air Force Colonel with over 20 years of military and information security experience. Mr. Davis is a CertifiedInformation Systems Security Professional (CISSP) and holds a Master’s Degree in Computer Science from George Washington University.

Greg White (San Antonio, TX), CompTIA Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA.

"About this title" may belong to another edition of this title.