2 options
ExamInsight For CompTIA Security+ Certification (SY0-101).
- Format:
- Book
- Author/Creator:
- Catura-Houser, Tim.
- Language:
- English
- Subjects (All):
- Computer networks--Security measures--Examinations--Study guides.
- Computer security--Examinations--Study guides.
- Electronic books. -- local.
- Electronic data processing personnel--Certification.
- Local Subjects:
- Computer networks--Security measures--Examinations--Study guides.
- Computer security--Examinations--Study guides.
- Electronic books. -- local.
- Electronic data processing personnel--Certification.
- Physical Description:
- 1 online resource (570 p.)
- Edition:
- 2nd ed.
- Place of Publication:
- Friendswood : TotalRecall Publications, 2002.
- Language Note:
- English
- Contents:
- ""ExamInsight For Exam SY0-101""; ""About the Authors""; ""Contributing Authors and Editors""; ""About the Book""; ""Other Resources""; ""Table of Contents""; ""Frequently Asked Questions""; ""Preface and Acknowledgments""; ""How To Read This Book""; ""Icon Alerts""; ""Security+ 2002 Exam Specifics""; ""Introduction""; ""Chapter 0000: Read.Me""; ""The biggest challenge in security is people5.""; ""0.1You�re saved�.If""; ""0.2Hacker vs. Cracker""; ""0.3Security Tao""; ""0.4Security Checklist""; ""0.5Security""; ""Technical Oxymoron""; ""0.6Resources""; ""0.7SpyWare""; ""0.8Summary""
- ""Chapter 0001: Domain 1.0:""""General Security Concepts (30%)""; ""Getting Ready - Questions""; ""Getting Ready - Answers""; ""1.0 General Security Concepts""; ""1.1 Access Control""; ""1.1.1 MAC/DAC/RBAC""; ""Mandatory Access Control""; ""Discretionary Access Control""; ""Role-Based Access Control""; ""1.2 Authentication""; ""1.2.1 Kerberos""; ""How does Kerberos authentication work?""; ""1.2.2 CHAP""; ""1.2.3 Certificates""; ""1.2.4 Username/Password""; ""1.2.5 Tokens""; ""1.2.6 Multi-Factor""; ""1.2.7 Mutual Authentication""; ""1.2.8 Biometrics""
- ""1.3 Non-essential Services and Protocols""""""; ""Pop Quiz 0000.00""; ""1.4 Attacks""; ""1.4.1 DoS/DDoS""; ""An early DDoS attack""; ""How and why do these attacks work?""; ""What can I do?""; ""1.4.2 Backdoors""; ""What�s a Rootkit?""; ""How do backdoors get onto a system?""; ""How do we stop back doors?""; ""1.4.3 Spoofing""; ""How TCP/IP permits spoofing""; ""Problem #1""; ""Problem #2 �""; ""Types of spoofing""; ""How can we protect our network from spoofing?""; ""1.4.4 Man in the Middle""; ""1.4.5 Replay""; ""1.4.6 TCP/IP Hijacking""; ""1.4.7 Weak Keys""; ""1.4.8 Mathematical""
- ""1.4.9 Social Engineering""""1.4.10 Birthday""; ""1.4.11 Password Guessing""; ""1.4.11.1 Brute Force""; ""1.4.11.2 Dictionary""; ""1.4.12 Software Exploitation""; ""Buffer overflows""; ""NaÃv̄e web applications""; ""1.5 Malicious Code""; ""1.5.1 Viruses""; ""1.5.2 Trojan Horses""; ""1.5.3 Logic Bombs""; ""1.5.4 Worms""; ""1.6 Social Engineering""; """"; ""Pop Quiz 0001.00""; ""1.7 Auditing""; """"; ""Configuration and Log Analysis""; ""System/Network Scanning""; ""1.8 Summary""; ""1.9Success Questions""; ""Success Answers""; ""Chapter 0010: Domain 2.0:""; ""Communication Security (20%)""
- ""Getting Ready � Questions""""Getting Ready � Answers""; ""2.0 Communication Security""; ""2.1 Remote Access""; ""2.1.1 802.1X""; ""Why is 802.1X needed?""; ""What is 802.1X?""; ""2.1.2 VPN""; ""2.1.3 RADIUS""; ""2.1.4 TACACS/XTACACS/TACACS+""; ""2.1.5 L2TP/PPTP""; ""PPTP""; ""TCP/IP Background Information""; ""L2TP""; ""2.1.6 SSH""; ""2.1.7 IPSEC""; ""IPSec packet types""; ""Transport and Tunnel Modes of IPSec""; ""IPSec and Encryption""; ""IPSec vs. DoS Attacks""; ""IPSec Interoperability""; ""2.1.8 Vulnerabilities""; ""2.2 Email""; ""2.2.1 S/MIME""; ""2.2.2 PGP""
- ""2.2.3 Vulnerabilities""
- Notes:
- Description based upon print version of record.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.