Vai al contenuto principale della pagina

ExamInsight For CompTIA Security+ Certification (SY0-101)



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Houser Tcat Visualizza persona
Titolo: ExamInsight For CompTIA Security+ Certification (SY0-101) Visualizza cluster
Pubblicazione: Friendswood, : TotalRecall Publications, 2002
Edizione: 2nd ed.
Descrizione fisica: 1 online resource (570 p.)
Disciplina: 005.8/076
Soggetto topico: Computer networks -- Security measures -- Examinations -- Study guides
Computer security -- Examinations -- Study guides
Electronic books. -- local
Electronic data processing personnel -- Certification
Engineering & Applied Sciences
Computer Science
Note generali: Description based upon print version of record.
Nota di contenuto: ""ExamInsight For Exam SY0-101""; ""About the Authors""; ""Contributing Authors and Editors""; ""About the Book""; ""Other Resources""; ""Table of Contents""; ""Frequently Asked Questions""; ""Preface and Acknowledgments""; ""How To Read This Book""; ""Icon Alerts""; ""Security+ 2002 Exam Specifics""; ""Introduction""; ""Chapter 0000: Read.Me""; ""The biggest challenge in security is people5.""; ""0.1You�re saved�.If""; ""0.2Hacker vs. Cracker""; ""0.3Security Tao""; ""0.4Security Checklist""; ""0.5Security""; ""Technical Oxymoron""; ""0.6Resources""; ""0.7SpyWare""; ""0.8Summary""
""Chapter 0001: Domain 1.0:""""General Security Concepts (30%)""; ""Getting Ready - Questions""; ""Getting Ready - Answers""; ""1.0 General Security Concepts""; ""1.1 Access Control""; ""1.1.1 MAC/DAC/RBAC""; ""Mandatory Access Control""; ""Discretionary Access Control""; ""Role-Based Access Control""; ""1.2 Authentication""; ""1.2.1 Kerberos""; ""How does Kerberos authentication work?""; ""1.2.2 CHAP""; ""1.2.3 Certificates""; ""1.2.4 Username/Password""; ""1.2.5 Tokens""; ""1.2.6 Multi-Factor""; ""1.2.7 Mutual Authentication""; ""1.2.8 Biometrics""
""1.3 Non-essential Services and Protocols""""""; ""Pop Quiz 0000.00""; ""1.4 Attacks""; ""1.4.1 DoS/DDoS""; ""An early DDoS attack""; ""How and why do these attacks work?""; ""What can I do?""; ""1.4.2 Backdoors""; ""What�s a Rootkit?""; ""How do backdoors get onto a system?""; ""How do we stop back doors?""; ""1.4.3 Spoofing""; ""How TCP/IP permits spoofing""; ""Problem #1""; ""Problem #2 �""; ""Types of spoofing""; ""How can we protect our network from spoofing?""; ""1.4.4 Man in the Middle""; ""1.4.5 Replay""; ""1.4.6 TCP/IP Hijacking""; ""1.4.7 Weak Keys""; ""1.4.8 Mathematical""
""1.4.9 Social Engineering""""1.4.10 Birthday""; ""1.4.11 Password Guessing""; ""1.4.11.1 Brute Force""; ""1.4.11.2 Dictionary""; ""1.4.12 Software Exploitation""; ""Buffer overflows""; ""NaÃv̄e web applications""; ""1.5 Malicious Code""; ""1.5.1 Viruses""; ""1.5.2 Trojan Horses""; ""1.5.3 Logic Bombs""; ""1.5.4 Worms""; ""1.6 Social Engineering""; """"; ""Pop Quiz 0001.00""; ""1.7 Auditing""; """"; ""Configuration and Log Analysis""; ""System/Network Scanning""; ""1.8 Summary""; ""1.9Success Questions""; ""Success Answers""; ""Chapter 0010: Domain 2.0:""; ""Communication Security (20%)""
""Getting Ready � Questions""""Getting Ready � Answers""; ""2.0 Communication Security""; ""2.1 Remote Access""; ""2.1.1 802.1X""; ""Why is 802.1X needed?""; ""What is 802.1X?""; ""2.1.2 VPN""; ""2.1.3 RADIUS""; ""2.1.4 TACACS/XTACACS/TACACS+""; ""2.1.5 L2TP/PPTP""; ""PPTP""; ""TCP/IP Background Information""; ""L2TP""; ""2.1.6 SSH""; ""2.1.7 IPSEC""; ""IPSec packet types""; ""Transport and Tunnel Modes of IPSec""; ""IPSec and Encryption""; ""IPSec vs. DoS Attacks""; ""IPSec Interoperability""; ""2.1.8 Vulnerabilities""; ""2.2 Email""; ""2.2.1 S/MIME""; ""2.2.2 PGP""
""2.2.3 Vulnerabilities""
Titolo autorizzato: ExamInsight For CompTIA Security+ Certification (SY0-101)  Visualizza cluster
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910813413503321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui