- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
Used Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
More copies of this ISBN
Principles of Computer Security Comptia Security+ and Beyond Lab Manual, Second Edition (2ND 11 Edition)by Vincent Nestler
Synopses & ReviewsPlease note that used books may not include additional media (study guides, CDs, DVDs, solutions manuals, etc.) as described in the publisher comments.
Written by leading IT security educators, this fully updated Lab Manual supplements Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition
Principles of Computer Security Lab Manual, Second Edition, contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence to Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition.
The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the Key Term Quiz helps to build vocabulary.
Principles of Computer Security Lab Manual, Second Edition, features:
Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy
About the Author
Vince Nestler, CompTIA Security+, CCNA, MCSE, RHCE (Pocatello, ID) is an Adjunct Professor of network security at Capitol College. Nestler is an instructional design expert with seven years of experience developing security related labs. He is the coauthor of the first editon of Principles of Computer Security: Security+ and Beyond Lab Manual.Greg White (San Antonio, TX), Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA, and was the author of the first edition of the Security+ All-in-One Exam Guide from McGraw-Hill.Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklins interests are information security, systems theory, and secure software design.
Table of Contents
Chapter 1. Introduction and Security Trends; Chapter 2. General Security Concepts; Chapter 3. Operational/Organizational Security; Chapter 4. The Role of People in Security; Chapter 5. Cryptography; Chapter 6. Public Key Infrastructure; Chapter 7. Standards and Protocols; Chapter 8. Physical Security; Chapter 9. Network Fundamentals; Chapter 10. Infrastructure Security; Chapter 11. Authentication and Remote Access; Chapter 12. Wireless Security; Chapter 13. Intrusion Detection Systems and Network Security; Chapter 14. Baselines; Chapter 15. Types of Attacks and Malicious Software; Chapter 16. E-mail and Instant Messaging; Chapter 17. Web Components; Chapter 18. Secure Software Development; Chapter 19. Disaster Recovery, Business Continuity, and Organizational Policies; Chapter 20. Risk Management; Chapter 21. Change Management; Chapter 22. Privilege Management; Chapter 23. Computer Forensics; Chapter 24. Legal Issues and Ethics; Chapter 25. Privacy
What Our Readers Are Saying
Computers and Internet » Computers Reference » Beginning and Reference