LEADER 01054nam0-22003251i-450- 001 990004471230403321 005 20141210085534.0 035 $a000447123 035 $aFED01000447123 035 $a(Aleph)000447123FED01 035 $a000447123 100 $a19990604d1857----km-y0itay50------ba 101 1 $afre$ceng 102 $aBE 105 $ay-------001yy 200 1 $aVie et caractére de Napoléon Bonaparte$fpar W. E. Channing et R. W. Emerson$gtraduit de l'anglais par Francois van Meenen 210 $aBruxelles$cImprimerie de François van Meenen$d1857 215 $aIII, 179 p.$d19 cm 610 0 $aNapoleone 676 $a944.05092 700 1$aChanning,$bWilliam Ellery$0178448 702 1$aEmerson,$bRalph Waldo$f<1803-1882> 702 1$aMeenen,$bFrancois Van 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004471230403321 952 $aSG 900/A 153$bR.Bibl. 14778$fFLFBC 959 $aFLFBC 996 $aVie et caractére de Napoléon Bonaparte$9544825 997 $aUNINA LEADER 05690nam 2200709Ia 450 001 9910790472403321 005 20200520144314.0 010 $a1-118-23661-0 010 $a1-280-67580-2 010 $a9786613652737 010 $a1-118-22272-5 035 $a(CKB)2670000000148239 035 $a(EBL)817999 035 $a(OCoLC)777374789 035 $a(SSID)ssj0000633093 035 $a(PQKBManifestationID)11397818 035 $a(PQKBTitleCode)TC0000633093 035 $a(PQKBWorkID)10617030 035 $a(PQKB)11446427 035 $a(Au-PeEL)EBL817999 035 $a(CaPaEBR)ebr10538597 035 $a(CaONFJC)MIL365273 035 $a(CaSebORM)9781118083192 035 $a(MiAaPQ)EBC817999 035 $a(EXLCZ)992670000000148239 100 $a20120320d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCASP$b[electronic resource] $eCompTIA Advanced Security Practitioner study guide (exam cas-001) /$fMichael Gregg, and Billy Haines 205 $a1st edition 210 $aIndianapolis, IN $cWiley Pub., Inc.$d2012 215 $a1 online resource (558 p.) 300 $aIncludes index. 311 $a1-118-08319-9 327 $aCASP CompTIA Advanced Security Practitioner Study Guide; Contents; Foreword; Introduction; Before You Begin the CompTIA CASP Certification Exam; How to Become a CASP Certified Professional; Who Should Read This Book?; How This Book Is Organized; Exam Strategy; How to Use This Book and Companion Website; The CASP (2011 Edition) Exam Objectives; Chapter 1: Cryptographic Tools and Techniques; The History of Cryptography; Cryptographic Services; Symmetric Encryption; Asymmetric Encryption; Hybrid Encryption; Hashing; Digital Signatures; Public Key Infrastructure; Cryptographic Solutions 327 $aCryptographic AttacksSummary; Exam Essentials; Review Questions; Chapter 2: Comprehensive Security Solutions; Advanced Network Design; TCP/IP; Secure Communication Solutions; Secure Facility Solutions; Secure Network Infrastructure Design; Summary; Exam Essentials; Review Questions; Chapter 3: Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Cloud Computing; Virtualization; Virtual LANs; Enterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4: Host Security; Firewalls and Access Control Lists; Host-Based Firewalls; Trusted Operating System 327 $aEndpoint Security SoftwareAnti-malware; Host Hardening; Asset Management; Data Exfiltration; Intrusion Detection and Prevention; Summary; Exam Essentials; Review Questions; Chapter 5: Application Security and Penetration Testing; Application Security; Specific Application Issues; Application Sandboxing; Application Security Framework; Standard Libraries; Secure Coding Standards; Application Exploits; Escalation of Privilege; Improper Storage of Sensitive Data; Cookie Storage and Transmission; Process Handling at the Client and Server; Security Assessments and Penetration Testing; Summary 327 $aExam EssentialsReview Questions; Chapter 6: Risk Management; Risk Terminology; Identifying Vulnerabilities; Operational Risks; The Risk Assessment Process; Best Practices for Risk Assessments; Summary; Exam Essentials; Review Questions; Chapter 7: Policies, Procedures, and Incident Response; A High-Level View of Documentation; Business Documents Used to Support Security; Documents and Controls Used for Sensitive Information; Auditing Requirements and Frequency; The Incident Response Framework; Digital Forensics; The Role of Training and Employee Awareness; Summary; Exam Essentials 327 $aReview QuestionsChapter 8: Security Research and Analysis; Analyzing Industry Trends and Outlining Potential Impact; Carrying Out Relevant Analysis to Secure the Enterprise; Summary; Exam Essentials; Review Questions; Chapter 9: Enterprise Security Integration; Integrate Enterprise Disciplines to Achieve Secure Solutions; Explain the Security Impact of Interorganizational Change; Summary; Exam Essentials; Review Questions; Chapter 10: Security Controls for Communication and Collaboration; Selecting and Distinguishing the Appropriate Security Controls 327 $aAdvanced Authentication Tools, Techniques, and Concepts 330 $aGet Prepared for CompTIA Advanced Security Practitioner (CASP) Exam Targeting security professionals who either have their CompTIA Security+ certification or are looking to achieve a more advanced security certification, this CompTIA Authorized study guide is focused on the new CompTIA Advanced Security Practitioner (CASP) Exam CAS-001. Veteran IT security expert and author Michael Gregg details the technical knowledge and skills you need to conceptualize, design, and engineer secure solutions across complex enterprise environments. He prepares you for aspects of the certification tes 517 3 $aCompTIA Advanced Security Practitioner study guide 606 $aElectronic data processing personnel$xCertification 606 $aComputer security$xExaminations$vStudy guides 606 $aComputer networks$xSecurity measures$xExaminations$vStudy guides 615 0$aElectronic data processing personnel$xCertification. 615 0$aComputer security$xExaminations 615 0$aComputer networks$xSecurity measures$xExaminations 676 $a005.8 676 $a005.8076 700 $aGregg$b Michael H$01552106 701 $aHaines$b Billy$c(Computer scientist)$01552107 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910790472403321 996 $aCASP$93811905 997 $aUNINA