LEADER 06184nam 22008173u 450 001 9910962195803321 005 20251117090548.0 010 $a1-283-17720-X 010 $a9786613177209 010 $a1-118-11358-6 035 $a(CKB)2550000000040607 035 $a(EBL)693686 035 $a(OCoLC)747412540 035 $a(SSID)ssj0000541133 035 $a(PQKBManifestationID)11391003 035 $a(PQKBTitleCode)TC0000541133 035 $a(PQKBWorkID)10498608 035 $a(PQKB)10670831 035 $a(WaSeSS)Ind00025751 035 $a(MiAaPQ)EBC693686 035 $a(EXLCZ)992550000000040607 100 $a20130418d2011|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity Administrator Street Smarts $eA Real World Guide to CompTIA Security+ Skills 205 $a3rd ed. 210 $aHoboken $cWiley$d2011 215 $a1 online resource (625 p.) 225 1 $aStreet smarts series 225 1 $aSybex serious skills 300 $aDescription based upon print version of record. 311 08$a1-118-06116-0 320 $aIncludes index. 327 $aCompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of Task 327 $aProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task 327 $aProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion 327 $aTask 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion 327 $aPhase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure 327 $aCriteria for Completion 330 $aA step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 410 0$aSerious skills. 606 $aComputer networks --Security measures --Examinations --Study guides 606 $aComputer security --Examinations --Study guides 606 $aElectronic data processing personnel --Certification 606 $aElectronic data processing personnel$xCertification$vStudy guides 606 $aComputer security$xExaminations$vStudy guides 606 $aComputer networks$xExaminations$xSecurity measures 606 $aEngineering & Applied Sciences$2HILCC 606 $aComputer Science$2HILCC 615 4$aComputer networks --Security measures --Examinations --Study guides. 615 4$aComputer security --Examinations --Study guides. 615 4$aElectronic data processing personnel --Certification. 615 0$aElectronic data processing personnel$xCertification 615 0$aComputer security$xExaminations 615 0$aComputer networks$xExaminations$xSecurity measures. 615 7$aEngineering & Applied Sciences 615 7$aComputer Science 676 $a005.8 686 $aCOM055000$2bisacsh 700 $aMiller$b David R$01856645 701 $aGregg$b Michael$0884346 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910962195803321 996 $aSecurity Administrator Street Smarts$94456276 997 $aUNINA