Conklin / White / Cothren | Principles of Computer Security, Fourth Edition | Buch | 978-0-07-183597-8 | sack.de

Buch, Englisch, 768 Seiten, Format (B × H): 212 mm x 274 mm, Gewicht: 1727 g

Conklin / White / Cothren

Principles of Computer Security, Fourth Edition


4 ed
ISBN: 978-0-07-183597-8
Verlag: McGraw-Hill Education - Europe

Buch, Englisch, 768 Seiten, Format (B × H): 212 mm x 274 mm, Gewicht: 1727 g

ISBN: 978-0-07-183597-8
Verlag: McGraw-Hill Education - Europe


Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+.Principles of Computer Security, Fourth Edition is a student-tested, introductory computer security textbook that provides comprehensive coverage of computer and network security fundamentals in an engaging and dynamic full-color design. In addition to teaching key computer security concepts, the textbook also fully prepares you for CompTIA Security+ exam SY0-401 with 100% coverage of all exam objectives. Each chapter begins with a list of topics to be covered and features sidebar exam and tech tips, a chapter summary, and an end-of-chapter assessment section that includes key term, multiple choice, and essay quizzes as well as lab projects. Electronic content includes CompTIA Security+ practice exam questions and a PDF copy of the book.Key features: - CompTIA Approved Quality Content (CAQC)
- Electronic content features two simulated practice exams in the Total Tester exam engine and a PDF eBook
- Supplemented by Principles of Computer Security Lab Manual, Fourth Edition, available separately 
- White and Conklin are two of the most well-respected computer security educators in higher education
- Instructor resource materials for adopting instructors include: Instructor Manual, PowerPoint slides featuring artwork from the book, and a test bank of questions for use as quizzes or exams
- Answers to the end of chapter sections are not included in the book and are only available to adopting instructors
Learn how to: - Ensure operational, organizational, and physical security
- Use cryptography and public key infrastructures (PKIs)
- Secure remote access, wireless networks, and virtual private networks (VPNs)
- Authenticate users and lock down mobile devices
- Harden network devices, operating systems, and applications
- Prevent network attacks, such as denial of service, spoofing, hijacking, and
password guessing
- Combat viruses, worms, Trojan horses, and rootkits
- Manage e-mail, instant messaging, and web security
- Explore secure software development requirements
- Implement disaster recovery and business continuity measures
- Handle computer forensics and incident response
- Understand legal, ethical, and privacy issues

Conklin / White / Cothren Principles of Computer Security, Fourth Edition jetzt bestellen!

Weitere Infos & Material


Chapter 1: Introduction and Security Trends
Chapter 2: General Security Concepts
Chapter 3: Operational/Organizational Security
Chapter 4: The Role of People in Security
Chapter 5: Cryptography
Chapter 6: Public Key Infrastructure
Chapter 7: Standards and Protocols
Chapter 8: Physical Security
Chapter 9: Network Fundamentals
Chapter 10: Infrastructure Security
Chapter 11: Authentication and Remote Access
Chapter 12: Wireless Security and Mobile Devices
Chapter 13: Intrusion Detection Systems and Network Security
Chapter 14: Baselines
Chapter 15: Types of Attacks and Malicious Software
Chapter 16: E-mail and Instant Messaging
Chapter 17: Web Components
Chapter 18: Secure Software Development
Chapter 19: Disaster Recovery, Business Continuity, and Organizational Policies
Chapter 20: Risk Management
Chapter 21: Change Management
Chapter 22: Incident Response
Chapter 23: Computer Forensics
Chapter 24: Legal Issues and Ethics
Chapter 25: Privacy
App A Objective Map  
App B About the CD-ROM  
Glossary
Index


Davis, Roger
Roger L. Davis is a Senior Internal Audit Manager at NuSkin Enterprises and is responsible for evaluating global business operations in over 35 countries. He is a retired Air Force Colonel with over 20 years of military and information security experience. Mr. Davis is a Certified Information Systems Security Professional (CISSP) and holds a Masters Degree in Computer Science from George Washington University.

Conklin, Wm. Arthur
Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklins interests are information security, systems theory, and secure software design.

White, Greg
Greg White (San Antonio, TX), CompTIA Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA.

Cothren, Chuck
Chuck Cothren is a Research Scientist at University of Texas at San Antonio (UTSA) Center for Infrastructure Assurance and Security (CIAS) and currently serves on the Information Security Associations Alamo Chapter Board of Directors. Mr. Cothren has a wide array of security experience including performing controlled penetration testing, network security policies, computer intrusion forensics, and computer training. He is a Certified Information Systems Security Professional (CISSP) and has co-authored other McGraw-Hill/Osborne titles. Mr. Cothren holds a B.S. in Industrial Distribution from Texas A&M University.

Wm. Arthur Conklin, Ph.D., CompTIA Security+, CISSP, is an associate professor in the Information and Logistics Technology Department at the University of Houston.Greg White, Ph.D., is a professor in the Department of Computer Science at the University of Texas at San Antonio. He is the director for the Center for Infrastructure Assurance and Security at UTSA.Corey Schou, Ph.D., series editor, is a fellow and vice chairperson of (ISC)2, the University Professor of Informatics and professor of Computer Science at Idaho State University, and the director of the Informatics Research Institute and the National Information Assurance Training and Education Center (NIATEC).



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.