MARC

LEADER 00000cam a2200000 a 4500
001 b10456814
006 m o d
007 cr |||||||||||
008 141110s2014 nyua o 001 0 eng d
005 20240829144902.4
019 |a 904280833  |a 1164490675  |a 1165384302 
020 |a 9780071832175 
020 |a 0071832173 
020 |a 0071832149 
020 |a 9780071832144 
020 |z 9780071832144 
029 1 |a DEBBG  |b BV042490096 
029 1 |a DEBSZ  |b 434832782 
035 |a (OCoLC)safo894906730 
035 |a (OCoLC)894906730  |z (OCoLC)904280833  |z (OCoLC)1164490675  |z (OCoLC)1165384302 
037 |a safo9780071832144 
040 |a UMI  |b eng  |e pn  |c UMI  |d DEBBG  |d VT2  |d REB  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCA  |d TOH  |d EBLCP  |d YDX  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
049 |a GWRE 
050 4 |a QA76.9.A25  |b .D86 2014 
100 1 |a Dunkerley, Dawn. 
245 1 0 |a CompTIA security+ (exam SY0-401) /  |c Dawn Dunkerley, T.J. Samuelle. 
246 3 0 |a CompTIA security+ certification passport (exam SY0-401) 
250 |a 4th ed. 
260 |a New York :  |b McGraw-Hill Education,  |c ©2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
490 1 |a Mike Meyers' certification passport 
588 0 |a Print version record. 
500 |a Includes index. 
505 0 |a Cover -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Check-In -- Part I: Organizational Security -- Chapter 1: Organizational Security and Compliance -- Objective 1.01 Explain Risk-Related Concepts -- Risk Control Types -- Risk Assessment -- Risk Management Options -- False Positives and Negatives -- Use Organizational Policies to Reduce Risk -- Objective 1.02 Implement Appropriate Risk Mitigation Strategies -- Change Management Policy -- Incident Management and Response Policy -- Perform Routine Audits -- User Rights and Permissions Reviews 
505 8 |a Data Loss Prevention and Regulatory Compliance -- Objective 1.03 Integrate with Third Parties -- Interoperability Agreements -- Privacy Considerations -- Risk Awareness -- Unauthorized Data Sharing -- Data Ownerships -- Data Backup -- Verification of Adherence -- Chapter 2: Security Training and Incident Response -- Objective 2.01 Explain the Importance of Security-Related Awareness and Training -- Accessing Policy Documentation -- Data and Documentation Policies -- Best Practices for User Habits -- Objective 2.02 Analyze and Differentiate Among Types of Social Engineering Attacks -- Phishing 
505 8 |a Whaling -- Shoulder Surfing -- Tailgating -- Pharming -- Spim -- Vishing -- Spam -- Hoaxes -- Objective 2.03 Execute Appropriate Incident Response Procedures -- Preparation -- Incident Identification -- First Responders -- Incident Isolation -- Damage and Loss Control -- Escalation Policy -- Reporting and Notification -- Mitigation and Recovery Steps -- Lessons Learned -- Objective 2.04 Implement Basic Forensic Procedures -- Collection and Preservation of Evidence -- Chapter 3: Business Continuity and Disaster Recovery -- Objective 3.01 Compare and Contrast Aspects of Business Continuity 
505 8 |a Recovery Plans -- Objective 3.02 Execute Disaster Recovery Plans and Procedures -- High Availability and Redundancy Planning -- Fault Tolerance -- Objective 3.03 Select the Appropriate Control to Meet the Goals of Security -- Objective 3.04 Explain the Impact and Proper Use of Environmental Controls -- Facility Construction Issues -- Environmental Issues -- Cable Shielding -- Fire Suppression -- Part II: Cryptography -- Chapter 4: Cryptography and Encryption Basics -- Objective 4.01 Utilize the Concepts of Cryptography -- Information Assurance -- Algorithms -- Steganography -- Digital Signatures 
505 8 |a Basic Hashing Concepts -- Message Digest Hashing -- Secure Hash Algorithm (SHA) -- RIPEMD -- HMAC -- Objective 4.02 Use and Apply Appropriate Cryptographic Tools and Products -- Symmetric Encryption Algorithms -- Asymmetric Encryption Algorithms -- One-Time Pad -- Quantum Cryptography -- Implementing Encryption Protocols -- Wireless Encryption -- Chapter 5: Public Key Infrastructure -- Objective 5.01 Explain the Core Concepts of Public Key Infrastructure -- Digital Certificates -- Certificate Authorities -- Trust Models -- Key Management and Storage 
650 0 |a Computer security  |x Examinations  |v Study guides. 
650 0 |a Computer networks  |x Security measures  |x Examinations  |v Study guides. 
650 0 |a Electronic data processing personnel  |x Certification. 
650 7 |a Computer networks  |x Security measures  |x Examinations  |2 fast 
650 7 |a Computer security  |x Examinations  |2 fast 
650 7 |a Electronic data processing personnel  |x Certification  |2 fast 
655 7 |a Study guides  |2 fast 
700 1 |a Meyers, Mike,  |d 1961-  |1 https://id.oclc.org/worldcat/entity/E39PCjMBy7jWBhp9rJgmBQxPpK 
700 1 |a Samuelle, T. J. 
710 2 |a Computing Technology Industry Association. 
758 |i has work:  |a CompTIA security+ (exam SY0-401) (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGFDqhWgcvrh678vbQd3V3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version :  |a Dunkerley, Dawn.  |t Mike Meyers' CompTIA security+ certification passport (exam SY0-401).  |b Fourth edition.  |d New York : McGraw-Hill Education, [2014]  |z 9780071832144  |w (DLC) 2014018875  |w (OCoLC)879662475 
830 0 |a Mike Meyers' certification passport. 
856 4 0 |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/9780071832144/?ar  |z Full Text (via O'Reilly/Safari) 
915 |a - 
956 |a O'Reilly-Safari eBooks 
956 |b O'Reilly Online Learning: Academic/Public Library Edition 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i 3899fb00-99ae-5ed6-a240-0d7ba8529777  |s e51a4274-e451-5d0a-8117-8ee65175f18d 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 .D86 2014  |h Library of Congress classification  |i web  |n 1