|
![]() |
|||
|
||||
OverviewReflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly preparing readers for the CompTIA Security+ SY0-301 certification exam. Its comprehensive introduction to practical network and computer security covers all of the the new CompTIA Security+ exam objectives. Cutting-edge coverage of the new edition includes virtualization, mobile devices, and other trends, as well as new topics such as psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security. Full Product DetailsAuthor: Mark Ciampa (Western Kentucky University)Publisher: Cengage Learning, Inc Imprint: Course Technology Inc Edition: 4th edition Dimensions: Width: 19.00cm , Height: 3.30cm , Length: 23.30cm Weight: 0.333kg ISBN: 9781111640125ISBN 10: 1111640122 Pages: 608 Publication Date: 25 July 2011 Audience: College/higher education , Tertiary & Higher Education Replaced By: 9781305093911 Format: Mixed media product Publisher's Status: Active Availability: Awaiting stock ![]() The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you. Table of ContentsReviewsClear and Concise coverage of a difficult and dynamic subject. Engaging for students, using examples and stories. Yes, this chapter introduces a wide array of technical terminology, in which the author does a fantastic job of breaking it down so that novice learners can comprehend it. Yes, the examples in this chapter are excellent in that they allow the reader to relate to the technical concepts in a comparative way. The Hands-on Projects for this chapter tie in well with the material presented. I believe that they provide students with several different ways to see how some of the attacks explained in the chapter are executed and how they can be prevented. I am now officially excited about the publication of this text, wish it was available for the Summer 2011 section that I am teaching using the 3rd edition. An excellent introduction to different types of Malware. An excellent coverage of Social Engineering techniques. Chapter one gives an overview of Information Security and threats. The fact that author has included one of the most current security threat (Stuxnet) at the beginning of the chapter is excellent. This will get the attention of the learners. Yes, this chapter introduces a wide array of technical terminology, in which the author does a fantastic job of breaking it down so that novice learners can comprehend it. Yes, the examples in this chapter are excellent in that they allow the reader to relate to the technical concepts in a comparative way. The Hands-on Projects for this chapter tie in well with the material presented. I believe that they provide students with several different ways to see how some of the attacks explained in the chapter are executed and how they can be prevented. I am now officially excited about the publication of this text, wish it was available for the Summer 2011 section that I am teaching using the 3rd edition. An excellent introduction to different types of Malware. An excellent coverage of Social Engineering techniques. Chapter one gives an overview of Information Security and threats. The fact that author has included one of the most current security threat (Stuxnet) at the beginning of the chapter is excellent. This will get the attention of the learners. Clear and Concise coverage of a difficult and dynamic subject. Engaging for students, using examples and stories. An excellent introduction to different types of Malware. An excellent coverage of Social Engineering techniques. Chapter one gives an overview of Information Security and threats. The fact that author has included one of the most current security threat (Stuxnet) at the beginning of the chapter is excellent. This will get the attention of the learners. Yes, this chapter introduces a wide array of technical terminology, in which the author does a fantastic job of breaking it down so that novice learners can comprehend it. Yes, the examples in this chapter are excellent in that they allow the reader to relate to the technical concepts in a comparative way. The Hands-on Projects for this chapter tie in well with the material presented. I believe that they provide students with several different ways to see how some of the attacks explained in the chapter are executed and how they can be prevented. I am now officially excited about the publication of this text, wish it was available for the Summer 2011 section that I am teaching using the 3rd edition. Clear and Concise coverage of a difficult and dynamic subject. Engaging for students, using examples and stories. An excellent introduction to different types of Malware. An excellent coverage of Social Engineering techniques. Chapter one gives an overview of Information Security and threats. The fact that author has included one of the most current security threat (Stuxnet) at the beginning of the chapter is excellent. This will get the attention of the learners. An excellent introduction to different types of Malware. An excellent coverage of Social Engineering techniques. Chapter one gives an overview of Information Security and threats. The fact that author has included one of the most current security threat (Stuxnet) at the beginning of the chapter is excellent. This will get the attention of the learners. Clear and Concise coverage of a difficult and dynamic subject. Engaging for students, using examples and stories. Yes, this chapter introduces a wide array of technical terminology, in which the author does a fantastic job of breaking it down so that novice learners can comprehend it. Yes, the examples in this chapter are excellent in that they allow the reader to relate to the technical concepts in a comparative way. The Hands-on Projects for this chapter tie in well with the material presented. I believe that they provide students with several different ways to see how some of the attacks explained in the chapter are executed and how they can be prevented. I am now officially excited about the publication of this text, wish it was available for the Summer 2011 section that I am teaching using the 3rd edition. Author InformationDr. Mark Ciampa is a professor of information systems in the Gordon Ford College of Business at Western Kentucky University in Bowling Green, Kentucky. Prior to this current role, he served as an associate professor and the director of academic computing at Volunteer State Community College in Gallatin, Tennessee, for 20 years. Dr. Ciampa has worked in the IT industry as a computer consultant for businesses, government agencies and educational institutions. He has published more than 20 articles in peer-reviewed journals and has written more than 25 technology textbooks, including CompTIA CySA+ Guide to Cybersecurity Analyst, Security+ Guide to Network Security Fundamentals, Security Awareness: Applying Practical Security in Your World, CWNA Guide to Wireless LANS, and Guide to Wireless Communications. Dr. Ciampa holds a Ph.D. in technology management with a specialization in digital communication systems from Indiana State University and has certifications in security and healthcare. Tab Content 6Author Website:Countries AvailableAll regions |