provides the high quality of the
Learn how to:
Ensure that the operational, organizational and physical security
Use of encryption and public key infrastructure (PKI)
Secure remote access, wireless, and virtual private network (VPN)
Harden network devices, operating systems and applications
Protect against network attacks, such as denial of service attacks, spoofing, hijacking, and password guessing
The fight against viruses, worms, Trojan horses, logic bombs, time bombs, and rootkit
Manage e-mail, instant messaging and Web security
Understand the requirements of the development of security software
Disaster recovery and business continuity
Implementation of risk, change, and privilege management measures
The processing computer forensics and incident response
Understand the legal, ethical and privacy issues
CD-ROM features:
Two complete practice exams
Ebook copy
Each chapter includes:
Learning Objectives
Photos and illustrations
Real-world examples
Try this! And cross-check
Principal terms of the prominent
Technical tips, notes and warnings
Examination skills
Final chapter tests and pilot projects
Show more
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.