We love eBooks
    Download Principles of Computer Security, Fourth Edition (Official Comptia Guide) pdf, epub, ebook

    This site is safe

    You are at a security, SSL-enabled, site. All our eBooks sources are constantly verified.

    Principles of Computer Security, Fourth Edition (Official Comptia Guide)

    By Wm. Arthur Conklin

    What do you think about this eBook?

    About

    Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+.

    Principles of Computer Security, Fourth Edition is a student-tested, introductory computer security textbook that provides comprehensive coverage of computer and network security fundamentals in an engaging and dynamic full-color design.

    In addition to teaching key computer security concepts, the textbook also fully prepares you for CompTIA Security+ exam SY0-401 with 100% coverage of all exam objectives. Each chapter begins with a list of topics to be covered and features sidebar exam and tech tips, a chapter summary, and an end-of-chapter assessment section that includes key term, multiple choice, and essay quizzes as well as lab projects. Electronic content includes CompTIA Security+ practice exam questions and a PDF copy of the book.

    Key features:

    • CompTIA Approved Quality Content (CAQC)
    • Electronic content features two simulated practice exams in the Total Tester exam engine and a PDF eBook
    • Supplemented by Principles of Computer Security Lab Manual, Fourth Edition, available separately
    • White and Conklin are two of the most well-respected computer security educators in higher education
    • Instructor resource materials for adopting instructors include: Instructor Manual, PowerPoint slides featuring artwork from the book, and a test bank of questions for use as quizzes or exams
    • Answers to the end of chapter sections are not included in the book and are only available to adopting instructors

    Learn how to:

    • Ensure operational, organizational, and physical security
    • Use cryptography and public key infrastructures (PKIs)
    • Secure remote access, wireless networks, and virtual private networks (VPNs)
    • Authenticate users and lock down mobile devices
    • Harden network devices, operating systems, and applications
    • Prevent network attacks, such as denial of service, spoofing, hijacking, and

      password guessing
    • Combat viruses, worms, Trojan horses, and rootkits
    • Manage e-mail, instant messaging, and web security
    • Explore secure software development requirements
    • Implement disaster recovery and business continuity measures
    • Handle computer forensics and incident response
    • Understand legal, ethical, and privacy issues
    Download eBook Link updated in 2017
    Maybe you will be redirected to source's website
    Thank you and welcome to our newsletter list! Ops, you're already in our list.

    eBooks by Wm. Arthur Conklin

    Author's page

    Related to this eBook

    Browse collections

    Keep connected to us

    Follow us on Social Media or subscribe to our newsletter to keep updated about eBooks world.

    Explore eBooks

    Browse all eBook collections

    Collections is the easy way to explore our eBook directory.