000 | 01985nam a2200505 4500 | ||
---|---|---|---|
003 | OSt | ||
005 | 20250314160108.0 | ||
008 | 250314s2025 ohua b 001 0 eng d | ||
020 | _a9798214000633 | ||
040 |
_cQCPL _erda |
||
082 | _a005.8 | ||
100 | 1 |
_aCiampa, Mark D. _eauthor |
|
245 | 1 | 0 |
_aCompTIA security+ _b: guide to network security fundamentals _c/ Mark Ciampa |
250 | _aEighth edition | ||
264 | 1 |
_aMason, Ohio : _bCengage, _c[2025] |
|
300 |
_axvii, 590 pages : _bcolor illustrations |
||
336 |
_2rdacontent _atext |
||
337 |
_2rdamedia _aunmediated |
||
338 |
_2rdacarrier _avolume |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aPart 1. Security foundations | |
505 | 0 | _aModule 1. Introduction to information security | |
505 | 0 | _aModule 2. Pervasive attack surfaces and controls | |
505 | 0 | _aPart 2. Cryptography | |
505 | 0 | _aModule 3. Fundamentals of cryptography | |
505 | 0 | _aModule 4. Advanced cryptography | |
505 | 0 | _aPart 3. Device security | |
505 | 0 | _aModule 5. Endpoint vulnerabilities, attacks, and defenses | |
505 | 0 | _aModule 6. Mobile and embedded device security | |
505 | 0 | _aModule 7. Identity and access management (IAM) | |
505 | 0 | _aPart 4. Infrastructure and architectures | |
505 | 0 | _aModule 8. Infrastructure threats and security monitoring | |
505 | 0 | _aModule 9. Infrastructure security | |
505 | 0 | _aModule 10. Wireless network attacks and defenses | |
505 | 0 | _aModule 11. Cloud and virtualization | |
505 | 0 | _aPart 5. Operations and management | |
505 | 0 | _aModule 12. Vulnerability management | |
505 | 0 | _aModule 13. Incident preparation and investigation | |
505 | 0 | _aModule 14. Oversight and operations | |
505 | 0 | _aModule 15. Information security management | |
650 |
_aComputer networks _xSecurity measures _xExaminations _vStudy guides |
||
650 | _aData protection | ||
690 |
_aComputers & technology _910971 |
||
942 |
_2ddc _cBOOK |
||
999 |
_c25657 _d25656 |