Security+ Guide to Network Security Fundamentals

by
Edition: 3rd
Format: Paperback
Pub. Date: 2008-11-11
Publisher(s): Course Technology
List Price: $280.29

Buy Used

In Stock
$200.21

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Table of Contents

Introduction to Security
Challenges of Securing Information
Today+s security attacks
Difficulties in defending against attacks
What Is Information Security?
Defining information security
Information security terminology
Understanding the importance of information security
Preventing data theft
Thwarting Identity Theft
Avoiding legal consequences
Maintaining Productivity
Foiling Cyberterrorism
Who Are the Attackers?
Hackers
Script Kiddies
Spies
Employees
Cybercriminals
Cyberterrorists
Attacks and Defenses
Steps of an attack
Defenses against attacks
Layering
Limiting
Diversity
Obscurity
Simplicity
Surveying Information Security Careers and the CompTIA Security+ Certification
System Threats and Risks
Software-Based Attacks {1.1)
Infecting Malware
Viruses (1.1)
Worms (1.1)
Concealing Malware
Trojan Horses (1.1)
Rootkits (1.1)
Logic Bombs (1.1)
Privilege escalation (1.1)
Profiting Malware
Spam (1.1)
Spyware (1.1)
Adware (1.1)
Keyloggers
Botnets (1.1)
Hardware Attacks {1.2}
BIOS (1.2)
USB devices (1.2)
Removable storage (1.2)
Network attached storage (1.2)
Cell phones (1.2)
Attacks on Virtualized Systems (1.6)
What is virtualization?
Attacks on virtual systems
Protecting Systems
Hardening the Operating System {1.3}
Managing operating system updates
Hot fixes (1.3)
Service packs (1.3)
Patches (1.3)
Patch management techniques (1.3)
Protecting the operating system through procedures
Group policies (1.3)
Security templates (1.3)
Configuration baselines (1.3)
Managing Application Security
Protecting the web browser (1.4)
ActiveX (1.4)
Java (1.4)
Scripting (1.4)
Cookies (1.4)
Input validation (1.4)
Cross-site scripting (1.4)
Protecting communication applications
Buffer overflows (1.4)
SMTP open relays (1.4)
Instant messaging (1.4)
P2P (1.4)
Applying System Security Applications
Host Intrusion Detection Systems (HIDS) (1.5)
Personal software firewalls (1.5)
Antivirus (1.5) iv. Anti-Spam (1.5) v. Popup blockers (1.5) NETWORK SECURITY
Network Vulnerabilities and Attacks
Liabilities in Networks
Media Liabilities
Vampire taps (2.6)
Cable placement
Wireless Network Liabilities
Data emanation (2.7)
SSID broadcast (2.7)
Weak encryption (2.7)
Attacks on Networks
Protocol-based attacks {2.1}
Antiquated protocols (2.1)
DNS poisoning (2.1)
ARP Poisoning (2.1)
Impersonation attacks
TCP/IP hijacking (2.1)
Spoofing (2.1)
Man in the middle (2.1)
Replay (2.1)
Wireless attacks
War driving (2.7)
Blue jacking (2.7)
Blue snarfing (2.7)
Rogue access points (2.7) iv. Other attacks {2.1}
Null sessions (2.1)
DOS (2.1)
DDOS (2.1)
Kiting (2.1)
Network Defenses
Creating a Secure Network
Security through network technologies
Network Address Translation (NAT) (2.2)
Network Access Control (NAC) (2.2)
Security through network design
Demilitarized zones (DMZ) (2.2)
Virtual LAN (VLAN) (2.2)
Virtual private network
Subnetting (2.2)
Network interconnections (2.2)
Convergence [? CompTIA has +Telephony+] (2.2)
Network Device Vulnerabilities {2.5}
Privilege escalation (2.5)
Weak passwords (2.5)
Back doors (2.5)
Def
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.