| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910457726503321 |
|
|
Autore |
Dulaney Emmett A |
|
|
Titolo |
CompTIA security+ deluxe study guide [[electronic resource] /] / Emmett Dulaney |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Indianapolis, : Wiley Pub., Inc., c2011 |
|
|
|
|
|
|
|
ISBN |
|
1-283-40073-1 |
9786613400734 |
1-118-11366-7 |
|
|
|
|
|
|
|
|
Edizione |
[2nd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (703 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Electronic data processing personnel - Certification |
Computer security - Examinations |
Computer networks - Security measures - Examinations |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Includes: "A handy tear card that maps every official exam objective"--P. 4 of cover. |
"Exam SY0-301"--Cover. |
Includes index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
CompTIA Discount Coupon; CompTIA Security+ Deluxe Study Guide; Contents; Foreword; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Measuring and Weighing Risk; Risk Assessment; Developing Policies, Standards, and Guidelines; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 2: Infrastructure and Connectivity; Mastering TCP/IP; Distinguishing between Security Topologies; Understanding Infrastructure Security; Understanding the Different Network Infrastructure Devices; Understanding Remote Access; Summary; Exam Essentials; Review Questions |
Answers to Review QuestionsChapter 3: Protecting Networks; Monitoring and Diagnosing Networks; Understanding Intrusion Detection Systems; Understanding Protocol Analyzers; Securing Workstations and Servers; Securing Internet Connections; Understanding Network Protocols; Summary; Exam Essentials; Review |
|
|
|
|
|
|
|
|
|
|
|
Questions; Answers to Review Questions; Chapter 4: Threats and Vulnerabilities; Understanding Software Exploitation; Surviving Malicious Code; Calculating Attack Strategies; Recognizing Common Attacks; Identifying TCP/IP Security Concerns; Summary; Exam Essentials; Review Questions |
Answers to Review QuestionsChapter 5: Access Control and Identity Management; Access Control Basics; Understanding Remote Access Connectivity; Understanding Authentication Services; Understanding Access Control; Implementing Access Control Best Practices; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 6: Educating and Protecting the User; Understanding Security Awareness and Training; Classifying Information; Information Access Controls; Complying with Privacy and Security Regulations; Understanding Social Engineering; Summary; Exam Essentials |
Review QuestionsAnswers to Review Questions; Chapter 7: Operating System and Application Security; Hardening the Operating System; Application Hardening; Working with Data Repositories; Host Security; Mobile Devices; Best Practices for Security; Attack Types to Be Aware Of; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 8: Cryptography Basics; An Overview of Cryptography; Understanding Cryptographic Algorithms; Using Cryptographic Systems; Understanding Cryptography Standards and Protocols; Summary; Exam Essentials; Review Questions |
Answers to Review QuestionsChapter 9: Cryptography Implementation; Using Public Key Infrastructure; Preparing for Cryptographic Attacks; Understanding Key Management and the Key Life Cycle; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 10: Physical and Hardware-Based Security; Implementing Access Control; Maintaining Environmental and Power Controls; Fire Suppression; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 11: Security and Vulnerability in the Network; Network Security Threats |
Secure Network Administration Principles |
|
|
|
|
|
|
Sommario/riassunto |
|
"Get a host of extras with this Deluxe version of our top-selling Security+ study guide!Prepare for CompTIA's new Security+ exam SY0-301 with this Deluxe Edition of our popular CompTIA Security+ Study Guide, 5th Edition. In addition to the 100% coverage of all exam objectives and study tools you'll find in the regular study guide, the Deluxe Edition gives additional hands-on exercises and study aides, three additional practice exams, over 100 additional electronic flashcards, valuable video demonstrations by the author, and an exclusive security administration simulator. Provides 100% coverage of all exam objectives for Security+ exam SY0-301 Packed with a hundred additional pages, located on the CD Features Deluxe-Edition-only additional practice exams and electronic flashcard, video demonstrations, and an exclusive Security Administrator simulator so you can practice in a real-world environment Covers key topics such as general security concepts, communication and infrastructure security, the basics of cryptography, operational security, and more Shows you pages of practical examples and offers insights drawn from the real world Get deluxe preparation, pass the exam, and jump-start your career. It all starts with CompTIA Security+ Deluxe Study Guide, 2nd Edition"-- |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910787200403321 |
|
|
Autore |
Zhang Hong |
|
|
Titolo |
Chinese through song / / Hong Zhang, Zu-yan Chen |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Albany, New York : , : State University of New York Press, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[Second edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (248 p.) |
|
|
|
|
|
|
Collana |
|
Global Academic Publishing Book |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Songs, Chinese |
Chinese language - Study and teaching - English speakers |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
""00_Preface""; ""Table of Contents""; ""01-1S_Song_of_Mount_Ali""; ""01-2Song_of_Moun_Ali""; ""02-1S_Kangding_Love_Song""; ""02-2Kangding_Love_Song""; ""03-1S_Jasmine_Flower""; ""03-Jasmine_Flower (1)""; ""04-1S_In_That_Distant_Place""; ""04-In_That_Distant_Place""; ""05-1S_Tangyuan_for_Sale""; ""05-Tangyuan_for_Sale""; ""06-1S_Sweet_Like_Honey""; ""06-Sweet_Like_Honey""; ""07-1S_The_Girl_of_Daban_City""; ""07-The_Girl_of_Daban_City""; ""08-1S_Little_Blade_of_Grass""; ""08-Little_Blade_of_Grass""; ""09-1S_The_Great_Sea_My_Homeland""; ""09-The_Great_Sea_My_Homeland"" |
""10-1S_Where_is_Spring""""10-Where_is_Spring (1)""; ""11-1S_Longing""; ""11-Longing (1)""; ""12-1S_Please_Lift_Your_Veil""; ""12-Please_Lift_Your_Veil (1)""; ""13-1S_Path_in_the_Forest""; ""13-Path_in_the_Forest (1)""; ""14-1S_Wishing_You_Peace""; ""14-Wishing_You_Peace (1)""; ""15-1S_Song_and_Smile""; ""15-Song_of_Smile""; ""16-1S_Dating_at_the_Aobao_Terrace""; ""16-Dating_at_the_Aobao_Terrace (1)""; ""17-1S_Where_Is_the_Way""; ""17-Where_is_the_Way (1)""; ""18-1S_Return_Home_Often""; ""18-Return_Home_Often (1)""; ""19-1S_Candied_Haws""; ""19-Candied_Haws (1)"" |
""20-1S_Husband_and_Wife_Return_Home_in_Pairs""""20-Husband_and_Wife_Return_Home_in_Pairs (1)""; ""21-1S_If_the_Mountain_Does_Not_Turn_the_Water_Will""; ""21- |
|
|
|
|
|
|
|
|
|
|
|
|
|
If_the_Mountain_Does_not_Tuen_the_Water_will""; ""22-1S_Rowing_the_Big_Boat_Together""; ""22-Rowing_the_Big_Boat_Together (1)""; ""23-1S_Wedding_Vow""; ""23-Wedding_Vow (1)""; ""24-1S_Boys_Don't_Guess_What's_on_a_Girl's_Mind""; ""24-Boys_Don't_Guess_What's_on_Girl's_Mind""; ""25-1S_My_Deskmate""; ""25-My_Deskmate (1)""; ""26-1S_The_Same_Song""; ""26-The_Same_Song (1)""; ""27-1S_The_Coolest_National_Style"" |
""27-The_Coolest_National_Style (2)""""28-1S_Chinese_Gongfu""; ""28-Chinese_Gongfu (1)""; ""29-1S_New_Year_Wishes""; ""29-New_Year_Wishes (1)""; ""30-1S_Chinese_Language""; ""30-Chinese_Language (2)""; ""31_Index""; ""32_About_the_Authors"" |
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910972420403321 |
|
|
Autore |
Torbakov Igor |
|
|
Titolo |
After Empire : Nationalist Imagination and Symbolic Politics in Russia and Eurasia in the Twentieth and Twenty-First Century / / Igor Torbakov, Andreas Umland, Serhii Plokhy |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (363 pages) |
|
|
|
|
|
|
Collana |
|
Soviet and Post-Soviet Politics and Society ; 191 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Post-Soviet |
Russia |
Politics |
Russland |
Politik |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Sommario/riassunto |
|
Igor Torbakov explores the nexus between various forms of Russian political imagination and the apparently cyclic process of decline and fall of Russia’s imperial polity over the last hundred years. While Russia’ |
|
|
|
|
|
|
|
|
|
|
s historical process is by no means unique, two features of its historical development stand out. First, the country’s history is characterized by dramatic political discontinuity. In the past century, Russia changed its “historical skin” three times: following the disintegration of the Tsarist Empire accompanied by violent civil war, it was reconstituted as the communist USSR, whose breakup a quarter century ago led to the emergence of the present-day Russian Federation. Each of the dramatic transformations in the 20th century powerfully affected the notion of what “Russia” is and what it means to be Russian. Second, alongside Russia’s political instability, there is, paradoxically, a striking picture of geopolitical stability and of remarkable longevity as an imperial entity. At least since the beginning of the 18th century, “Russia” has been a permanent geopolitical fixture on Europe’s north-eastern margins with its persistent pretense to the status of a great power. Against this backdrop, the book’s three sections investigate (a) the emergence and development of Eurasianism as a form of (post-)imperial ideology, (b) the crucial role Ukraine has historically played for the Russians’ self-understanding, and (c) the contemporary Russian elites’ exercises in historical legitimation. |
|
|
|
|
|
| |