LEADER 04955nam 22006253u 450 001 9910813413503321 005 20240417044456.0 035 $a(CKB)1000000000002788 035 $a(EBL)3410565 035 $a(SSID)ssj0000672820 035 $a(PQKBManifestationID)11362656 035 $a(PQKBTitleCode)TC0000672820 035 $a(PQKBWorkID)10636364 035 $a(PQKB)10362281 035 $a(MiAaPQ)EBC3410565 035 $a(EXLCZ)991000000000002788 100 $a20151005d2002|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aExamInsight For CompTIA Security+ Certification (SY0-101) 205 $a2nd ed. 210 $aFriendswood $cTotalRecall Publications$d2002 215 $a1 online resource (570 p.) 300 $aDescription based upon print version of record. 311 $a1-59095-672-9 327 $a""ExamInsight For Exam SY0-101""; ""About the Authors""; ""Contributing Authors and Editors""; ""About the Book""; ""Other Resources""; ""Table of Contents""; ""Frequently Asked Questions""; ""Preface and Acknowledgments""; ""How To Read This Book""; ""Icon Alerts""; ""Security+ 2002 Exam Specifics""; ""Introduction""; ""Chapter 0000: Read.Me""; ""The biggest challenge in security is people5.""; ""0.1Youa???re saveda???.If""; ""0.2Hacker vs. Cracker""; ""0.3Security Tao""; ""0.4Security Checklist""; ""0.5Security""; ""Technical Oxymoron""; ""0.6Resources""; ""0.7SpyWare""; ""0.8Summary"" 327 $a""Chapter 0001: Domain 1.0:""""General Security Concepts (30%)""; ""Getting Ready - Questions""; ""Getting Ready - Answers""; ""1.0 General Security Concepts""; ""1.1 Access Control""; ""1.1.1 MAC/DAC/RBAC""; ""Mandatory Access Control""; ""Discretionary Access Control""; ""Role-Based Access Control""; ""1.2 Authentication""; ""1.2.1 Kerberos""; ""How does Kerberos authentication work?""; ""1.2.2 CHAP""; ""1.2.3 Certificates""; ""1.2.4 Username/Password""; ""1.2.5 Tokens""; ""1.2.6 Multi-Factor""; ""1.2.7 Mutual Authentication""; ""1.2.8 Biometrics"" 327 $a""1.3 Non-essential Services and Protocols""""""; ""Pop Quiz 0000.00""; ""1.4 Attacks""; ""1.4.1 DoS/DDoS""; ""An early DDoS attack""; ""How and why do these attacks work?""; ""What can I do?""; ""1.4.2 Backdoors""; ""Whata???s a Rootkit?""; ""How do backdoors get onto a system?""; ""How do we stop back doors?""; ""1.4.3 Spoofing""; ""How TCP/IP permits spoofing""; ""Problem #1""; ""Problem #2 a???""; ""Types of spoofing""; ""How can we protect our network from spoofing?""; ""1.4.4 Man in the Middle""; ""1.4.5 Replay""; ""1.4.6 TCP/IP Hijacking""; ""1.4.7 Weak Keys""; ""1.4.8 Mathematical"" 327 $a""1.4.9 Social Engineering""""1.4.10 Birthday""; ""1.4.11 Password Guessing""; ""1.4.11.1 Brute Force""; ""1.4.11.2 Dictionary""; ""1.4.12 Software Exploitation""; ""Buffer overflows""; ""NaA?v?e web applications""; ""1.5 Malicious Code""; ""1.5.1 Viruses""; ""1.5.2 Trojan Horses""; ""1.5.3 Logic Bombs""; ""1.5.4 Worms""; ""1.6 Social Engineering""; """"; ""Pop Quiz 0001.00""; ""1.7 Auditing""; """"; ""Configuration and Log Analysis""; ""System/Network Scanning""; ""1.8 Summary""; ""1.9Success Questions""; ""Success Answers""; ""Chapter 0010: Domain 2.0:""; ""Communication Security (20%)"" 327 $a""Getting Ready a??? Questions""""Getting Ready a??? Answers""; ""2.0 Communication Security""; ""2.1 Remote Access""; ""2.1.1 802.1X""; ""Why is 802.1X needed?""; ""What is 802.1X?""; ""2.1.2 VPN""; ""2.1.3 RADIUS""; ""2.1.4 TACACS/XTACACS/TACACS+""; ""2.1.5 L2TP/PPTP""; ""PPTP""; ""TCP/IP Background Information""; ""L2TP""; ""2.1.6 SSH""; ""2.1.7 IPSEC""; ""IPSec packet types""; ""Transport and Tunnel Modes of IPSec""; ""IPSec and Encryption""; ""IPSec vs. DoS Attacks""; ""IPSec Interoperability""; ""2.1.8 Vulnerabilities""; ""2.2 Email""; ""2.2.1 S/MIME""; ""2.2.2 PGP"" 327 $a""2.2.3 Vulnerabilities"" 606 $aComputer networks -- Security measures -- Examinations -- Study guides 606 $aComputer security -- Examinations -- Study guides 606 $aElectronic books. -- local 606 $aElectronic data processing personnel -- Certification 606 $aEngineering & Applied Sciences$2HILCC 606 $aComputer Science$2HILCC 615 4$aComputer networks -- Security measures -- Examinations -- Study guides. 615 4$aComputer security -- Examinations -- Study guides. 615 4$aElectronic books. -- local. 615 4$aElectronic data processing personnel -- Certification. 615 7$aEngineering & Applied Sciences 615 7$aComputer Science 676 $a005.8/076 700 $aHouser$b Tcat$01592967 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910813413503321 996 $aExamInsight For CompTIA Security+ Certification (SY0-101)$93912863 997 $aUNINA