CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card)

Author:   Mark Ciampa (Western Kentucky University)
Publisher:   Cengage Learning, Inc
Edition:   5th edition
ISBN:  

9781305093911


Pages:   608
Publication Date:   05 August 2014
Replaced By:   9781337288781
Format:   Mixed media product
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $472.43 Quantity:  
Add to Cart

Share |

CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card)


Add your own review!

Overview

Full Product Details

Author:   Mark Ciampa (Western Kentucky University)
Publisher:   Cengage Learning, Inc
Imprint:   Course Technology Inc
Edition:   5th edition
Dimensions:   Width: 18.70cm , Height: 3.60cm , Length: 23.10cm
Weight:   1.180kg
ISBN:  

9781305093911


ISBN 10:   1305093917
Pages:   608
Publication Date:   05 August 2014
Audience:   College/higher education ,  Tertiary & Higher Education
Replaced By:   9781337288781
Format:   Mixed media product
Publisher's Status:   Active
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

Reviews

I was especially impressed by the information in Chapter 14 regarding policies. The chapter leaves the reader with a good understanding of how, why, and when to create policies, along with how to implement them into an organization. Ch 12 does a great job of taking an age old security topic like passwords, and putting an interesting spin on it in ways that students will be able to relate to. Chapter 13 does a good job discussing many different redundancy based technologies and it also excels in keepting the discussions pointed and brief. The end of the chapter hands on projects are great and the support the concepts in the chapter as a whole. The chapter does prepare the student to complete all the end of chapter projects. The introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent.


Ch 12 does a great job of taking an age old security topic like passwords, and putting an interesting spin on it in ways that students will be able to relate to. I was especially impressed by the information in Chapter 14 regarding policies. The chapter leaves the reader with a good understanding of how, why, and when to create policies, along with how to implement them into an organization. Chapter 13 does a good job discussing many different redundancy based technologies and it also excels in keepting the discussions pointed and brief. The end of the chapter hands on projects are great and the support the concepts in the chapter as a whole. The chapter does prepare the student to complete all the end of chapter projects. The introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent.


I was especially impressed by the information in Chapter 14 regarding policies. The chapter leaves the reader with a good understanding of how, why, and when to create policies, along with how to implement them into an organization. Chapter 13 does a good job discussing many different redundancy based technologies and it also excels in keepting the discussions pointed and brief. The end of the chapter hands on projects are great and the support the concepts in the chapter as a whole. The chapter does prepare the student to complete all the end of chapter projects. The introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent. Ch 12 does a great job of taking an age old security topic like passwords, and putting an interesting spin on it in ways that students will be able to relate to.


I was especially impressed by the information in Chapter 14 regarding policies. The chapter leaves the reader with a good understanding of how, why, and when to create policies, along with how to implement them into an organization. The end of the chapter hands on projects are great and the support the concepts in the chapter as a whole. The chapter does prepare the student to complete all the end of chapter projects. Ch 12 does a great job of taking an age old security topic like passwords, and putting an interesting spin on it in ways that students will be able to relate to. Chapter 13 does a good job discussing many different redundancy based technologies and it also excels in keepting the discussions pointed and brief. The introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent.


The introduction to is excellent! It gives a great scenario of an event that can and have occurred with within the security realm. It give a great lead into the overall point of chapter 12 on why secure passwords are essential and how social media can be hacked if you do not setup secure passwords. The section on Passwords and Biometrics is excellent.


Author Information

Dr. Mark Ciampa is a professor of information systems in the Gordon Ford College of Business at Western Kentucky University in Bowling Green, Kentucky. Prior to this current role, he served as an associate professor and the director of academic computing at Volunteer State Community College in Gallatin, Tennessee, for 20 years. Dr. Ciampa has worked in the IT industry as a computer consultant for businesses, government agencies and educational institutions. He has published more than 20 articles in peer-reviewed journals and has written more than 25 technology textbooks, including CompTIA CySA+ Guide to Cybersecurity Analyst, Security+ Guide to Network Security Fundamentals, Security Awareness: Applying Practical Security in Your World, CWNA Guide to Wireless LANS, and Guide to Wireless Communications. Dr. Ciampa holds a Ph.D. in technology management with a specialization in digital communication systems from Indiana State University and has certifications in security and healthcare.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List