LEADER 00980nam--2200349---450- 001 990002857310203316 005 20070118144125.0 035 $a000285731 035 $aUSA01000285731 035 $a(ALEPH)000285731USA01 035 $a000285731 100 $a20070118d1925----km-y0itay50------ba 101 $afre 102 $aFR 105 $a||||||||001yy 200 1 $aAmyntas$eMopsus, Feuilles de route, De Biskra a Touggourt, Le renoncement ou voyage$fAndré Gide 210 $aParis$cLibrairie Gallimard$cEdition de la Nouvelle Revue Française$d[c1925] 215 $a220 p.$d17 cm 225 2 $aNRF 410 0$12001$aNRF 454 1$12001 461 1$1001-------$12001 676 $a943.91 700 1$aGIDE,$bAndré$0385265 801 0$aIT$bsalbc$gISBD 912 $a990002857310203316 951 $aXV.5. 55$b195143 LM$cXV.5. 959 $aBK 969 $aFG 979 $aSENATORE$b90$c20070118$lUSA01$h1441 996 $aAmyntas$9991915 997 $aUNISA LEADER 00951nam--2200337---450 001 990000396650203316 005 20210915101335.0 010 $a88-7989-170-7 035 $a0039665 035 $aUSA010039665 035 $a(ALEPH)000039665USA01 035 $a0039665 100 $a20010409d1996----km-y0itay0103----ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aStoria della borghesia italiana$el'età liberale$fAlberto M. Banti 210 $aRoma$cDonzelli$d1996 215 $aXVII, 395 p.$d21 cm 225 2 $aProgetti Donzelli 410 $12001$aProgetti Donzelli 606 0 $aBorghesia$yItalia$xStoria 676 $a945. 700 1$aBANTI,$bAlberto Mario$0143603 801 0$aIT$bsalbc$gISBD 912 $a990000396650203316 951 $aX.3.B. 3241 (VARIE COLL. 1174/1)$b132471 L.M.$cVARIE COLL. 959 $aBK 969 $aUMA 996 $aStoria della borghesia italiana$9498722 997 $aUNISA LEADER 06209nam 22008173u 450 001 9910781478503321 005 20230124183437.0 010 $a1-283-17720-X 010 $a9786613177209 010 $a1-118-11358-6 035 $a(CKB)2550000000040607 035 $a(EBL)693686 035 $a(OCoLC)747412540 035 $a(SSID)ssj0000541133 035 $a(PQKBManifestationID)11391003 035 $a(PQKBTitleCode)TC0000541133 035 $a(PQKBWorkID)10498608 035 $a(PQKB)10670831 035 $a(WaSeSS)Ind00025751 035 $a(MiAaPQ)EBC693686 035 $a(EXLCZ)992550000000040607 100 $a20130418d2011|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Administrator Street Smarts$b[electronic resource] $eA Real World Guide to CompTIA Security+ Skills 205 $a3rd ed. 210 $aHoboken $cWiley$d2011 215 $a1 online resource (625 p.) 225 1 $aStreet smarts series 225 1 $aSybex serious skills 300 $aDescription based upon print version of record. 311 $a1-118-06116-0 320 $aIncludes index. 327 $aCompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of Task 327 $aProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task 327 $aProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion 327 $aTask 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion 327 $aPhase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure 327 $aCriteria for Completion 330 $aA step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 410 0$aSerious skills. 606 $aComputer networks --Security measures --Examinations --Study guides 606 $aComputer security --Examinations --Study guides 606 $aElectronic data processing personnel --Certification 606 $aElectronic data processing personnel$xCertification$vStudy guides 606 $aComputer security$xExaminations$vStudy guides 606 $aComputer networks$xExaminations$xSecurity measures 606 $aEngineering & Applied Sciences$2HILCC 606 $aComputer Science$2HILCC 615 4$aComputer networks --Security measures --Examinations --Study guides. 615 4$aComputer security --Examinations --Study guides. 615 4$aElectronic data processing personnel --Certification. 615 0$aElectronic data processing personnel$xCertification 615 0$aComputer security$xExaminations 615 0$aComputer networks$xExaminations$xSecurity measures 615 7$aEngineering & Applied Sciences 615 7$aComputer Science 676 $a005.8 686 $aCOM055000$2bisacsh 700 $aMiller$b David R$01567425 701 $aGregg$b Michael$0884346 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910781478503321 996 $aSecurity Administrator Street Smarts$93838844 997 $aUNINA