|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
b10456814 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
141110s2014 nyua o 001 0 eng d |
005 |
20240829144902.4 |
019 |
|
|
|a 904280833
|a 1164490675
|a 1165384302
|
020 |
|
|
|a 9780071832175
|
020 |
|
|
|a 0071832173
|
020 |
|
|
|a 0071832149
|
020 |
|
|
|a 9780071832144
|
020 |
|
|
|z 9780071832144
|
029 |
1 |
|
|a DEBBG
|b BV042490096
|
029 |
1 |
|
|a DEBSZ
|b 434832782
|
035 |
|
|
|a (OCoLC)safo894906730
|
035 |
|
|
|a (OCoLC)894906730
|z (OCoLC)904280833
|z (OCoLC)1164490675
|z (OCoLC)1165384302
|
037 |
|
|
|a safo9780071832144
|
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d DEBBG
|d VT2
|d REB
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCA
|d TOH
|d EBLCP
|d YDX
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
049 |
|
|
|a GWRE
|
050 |
|
4 |
|a QA76.9.A25
|b .D86 2014
|
100 |
1 |
|
|a Dunkerley, Dawn.
|
245 |
1 |
0 |
|a CompTIA security+ (exam SY0-401) /
|c Dawn Dunkerley, T.J. Samuelle.
|
246 |
3 |
0 |
|a CompTIA security+ certification passport (exam SY0-401)
|
250 |
|
|
|a 4th ed.
|
260 |
|
|
|a New York :
|b McGraw-Hill Education,
|c ©2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier
|
490 |
1 |
|
|a Mike Meyers' certification passport
|
588 |
0 |
|
|a Print version record.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Check-In -- Part I: Organizational Security -- Chapter 1: Organizational Security and Compliance -- Objective 1.01 Explain Risk-Related Concepts -- Risk Control Types -- Risk Assessment -- Risk Management Options -- False Positives and Negatives -- Use Organizational Policies to Reduce Risk -- Objective 1.02 Implement Appropriate Risk Mitigation Strategies -- Change Management Policy -- Incident Management and Response Policy -- Perform Routine Audits -- User Rights and Permissions Reviews
|
505 |
8 |
|
|a Data Loss Prevention and Regulatory Compliance -- Objective 1.03 Integrate with Third Parties -- Interoperability Agreements -- Privacy Considerations -- Risk Awareness -- Unauthorized Data Sharing -- Data Ownerships -- Data Backup -- Verification of Adherence -- Chapter 2: Security Training and Incident Response -- Objective 2.01 Explain the Importance of Security-Related Awareness and Training -- Accessing Policy Documentation -- Data and Documentation Policies -- Best Practices for User Habits -- Objective 2.02 Analyze and Differentiate Among Types of Social Engineering Attacks -- Phishing
|
505 |
8 |
|
|a Whaling -- Shoulder Surfing -- Tailgating -- Pharming -- Spim -- Vishing -- Spam -- Hoaxes -- Objective 2.03 Execute Appropriate Incident Response Procedures -- Preparation -- Incident Identification -- First Responders -- Incident Isolation -- Damage and Loss Control -- Escalation Policy -- Reporting and Notification -- Mitigation and Recovery Steps -- Lessons Learned -- Objective 2.04 Implement Basic Forensic Procedures -- Collection and Preservation of Evidence -- Chapter 3: Business Continuity and Disaster Recovery -- Objective 3.01 Compare and Contrast Aspects of Business Continuity
|
505 |
8 |
|
|a Recovery Plans -- Objective 3.02 Execute Disaster Recovery Plans and Procedures -- High Availability and Redundancy Planning -- Fault Tolerance -- Objective 3.03 Select the Appropriate Control to Meet the Goals of Security -- Objective 3.04 Explain the Impact and Proper Use of Environmental Controls -- Facility Construction Issues -- Environmental Issues -- Cable Shielding -- Fire Suppression -- Part II: Cryptography -- Chapter 4: Cryptography and Encryption Basics -- Objective 4.01 Utilize the Concepts of Cryptography -- Information Assurance -- Algorithms -- Steganography -- Digital Signatures
|
505 |
8 |
|
|a Basic Hashing Concepts -- Message Digest Hashing -- Secure Hash Algorithm (SHA) -- RIPEMD -- HMAC -- Objective 4.02 Use and Apply Appropriate Cryptographic Tools and Products -- Symmetric Encryption Algorithms -- Asymmetric Encryption Algorithms -- One-Time Pad -- Quantum Cryptography -- Implementing Encryption Protocols -- Wireless Encryption -- Chapter 5: Public Key Infrastructure -- Objective 5.01 Explain the Core Concepts of Public Key Infrastructure -- Digital Certificates -- Certificate Authorities -- Trust Models -- Key Management and Storage
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Examinations
|2 fast
|
650 |
|
7 |
|a Computer security
|x Examinations
|2 fast
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification
|2 fast
|
655 |
|
7 |
|a Study guides
|2 fast
|
700 |
1 |
|
|a Meyers, Mike,
|d 1961-
|1 https://id.oclc.org/worldcat/entity/E39PCjMBy7jWBhp9rJgmBQxPpK
|
700 |
1 |
|
|a Samuelle, T. J.
|
710 |
2 |
|
|a Computing Technology Industry Association.
|
758 |
|
|
|i has work:
|a CompTIA security+ (exam SY0-401) (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGFDqhWgcvrh678vbQd3V3
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version :
|a Dunkerley, Dawn.
|t Mike Meyers' CompTIA security+ certification passport (exam SY0-401).
|b Fourth edition.
|d New York : McGraw-Hill Education, [2014]
|z 9780071832144
|w (DLC) 2014018875
|w (OCoLC)879662475
|
830 |
|
0 |
|a Mike Meyers' certification passport.
|
856 |
4 |
0 |
|u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/9780071832144/?ar
|z Full Text (via O'Reilly/Safari)
|
915 |
|
|
|a -
|
956 |
|
|
|a O'Reilly-Safari eBooks
|
956 |
|
|
|b O'Reilly Online Learning: Academic/Public Library Edition
|
994 |
|
|
|a 92
|b COD
|
998 |
|
|
|b Subsequent record output
|
999 |
f |
f |
|i 3899fb00-99ae-5ed6-a240-0d7ba8529777
|s e51a4274-e451-5d0a-8117-8ee65175f18d
|
952 |
f |
f |
|p Can circulate
|a University of Colorado Boulder
|b Online
|c Online
|d Online
|e QA76.9.A25 .D86 2014
|h Library of Congress classification
|i web
|n 1
|