Local cover image
Local cover image

CompTIA security+ : guide to network security fundamentals / Mark Ciampa

By: Material type: TextTextPublisher: Mason, Ohio : Cengage, [2025]Edition: Eighth editionDescription: xvii, 590 pages : color illustrationsContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9798214000633
Subject(s): DDC classification:
  • 005.8
Contents:
Part 1. Security foundations
Module 1. Introduction to information security
Module 2. Pervasive attack surfaces and controls
Part 2. Cryptography
Module 3. Fundamentals of cryptography
Module 4. Advanced cryptography
Part 3. Device security
Module 5. Endpoint vulnerabilities, attacks, and defenses
Module 6. Mobile and embedded device security
Module 7. Identity and access management (IAM)
Part 4. Infrastructure and architectures
Module 8. Infrastructure threats and security monitoring
Module 9. Infrastructure security
Module 10. Wireless network attacks and defenses
Module 11. Cloud and virtualization
Part 5. Operations and management
Module 12. Vulnerability management
Module 13. Incident preparation and investigation
Module 14. Oversight and operations
Module 15. Information security management
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Barcode
Book Book Lagro Branch Reference Section Reference R 005.8 C565c 2025 (Browse shelf(Opens below)) c. 2 Room use only 57740QC
Book Book Main Library Reference Section Reference R 005.8 C565c 2025 (Browse shelf(Opens below)) c. 1 Room use only 57739QC

Includes bibliographical references and index.

Part 1. Security foundations

Module 1. Introduction to information security

Module 2. Pervasive attack surfaces and controls

Part 2. Cryptography

Module 3. Fundamentals of cryptography

Module 4. Advanced cryptography

Part 3. Device security

Module 5. Endpoint vulnerabilities, attacks, and defenses

Module 6. Mobile and embedded device security

Module 7. Identity and access management (IAM)

Part 4. Infrastructure and architectures

Module 8. Infrastructure threats and security monitoring

Module 9. Infrastructure security

Module 10. Wireless network attacks and defenses

Module 11. Cloud and virtualization

Part 5. Operations and management

Module 12. Vulnerability management

Module 13. Incident preparation and investigation

Module 14. Oversight and operations

Module 15. Information security management

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image