CIW - Security Professional Study Guide
Sybex Inc.,U.S.
978-0-7821-4084-2 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
Here's the book you need to prepare for Exam 1D0 470, CIW Security Professional. This Study Guide provides: in depth coverage of official exam objectives; practical information on security concepts and practices; hundreds of challenging review questions, in the book and on the CD; leading edge exam preparation software, including a testing engine and electronic flashcards. It includes authoritative coverage of all exam topics, such as: implementing internetworking encryption and encryption methods; analyzing firewall types and firewall terminology; planning security systems and incorporating multiple levels of protection; securing mechanisms and parameters for Windows and UNIX; analyzing router security, threat containment, and intrusion detection; implementing intrusion detection systems in an enterprise environment; installing operating system; and, add ons for personal firewalls and native auditing.
James Stanger has been working in the IT industry since 1995. A Master CIW Administrator, he has worked for ProsoftTraining as Course Director for the CIW Server Administrator and CIW Security Professional certifications since 1999. Patrick T. Lane is the Director of Courseware for ProsoftTraining.com. He assisted in the creation of the CIW program and the i Accelerate program for Intel, Novell and Microsoft professionals. Tim Crothers, CCNA, CIW, MCSE, CNE, is the chief security engineer at ITM Technology LLC, a firm that offers leading edge Internet threat management services.
Contents at a Glance. Introduction. Assessment Test. Chapter 1: What Is Security?. Chapter 2: Applied Encryption. Chapter 3: Types of Attacks. Chapter 4: General Security Principles. Chapter 5: Firewalls Roles and Types. Chapter 6: Firewall Topologies and Virtual Private Networks. Chapter 7: Detecting and Distracting Hackers. Chapter 8: Operating System Security. Chapter 9: File System Security. Chapter 10: Assessing and Reducing Risk. Chapter 11: The Auditing Process. Chapter 12: Auditing Penetration and Control Strategies. Chapter 13: Intrusion Detection. Chapter 14: Auditing and Log Analysis. Chapter 15: Recommending Solutions and Generating Reports. Appendix A: Sample Security Audit Report. Appendix B: A Sample Enterprise Scanner Report. Appendix C: Internet Security Resources. Glossary. Index.
Erscheint lt. Verlag | 25.6.2002 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Maße | 197 x 237 mm |
Gewicht | 1526 g |
Einbandart | gebunden |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Web / Internet | |
ISBN-10 | 0-7821-4084-X / 078214084X |
ISBN-13 | 978-0-7821-4084-2 / 9780782140842 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich