CompTIA Security+ Guide to Network Security Fundamentals 8th Edition by Mark Cia

grandeagleretail
(952910)
Registrado como vendedor profesional
USD111,22
Aproximadamente94,13 EUR
Estado:
Nuevo
3 disponibles5 vendidos
Respira tranquilidad. Se aceptan devoluciones.
Artículo popular. 5 ya se han vendido.
Envío:
Gratis Economy Shipping.
Ubicado en: Fairfield, Ohio, Estados Unidos
Entrega:
Entrega prevista entre el sáb. 27 sep. y el vie. 3 oct. a 94104
Calculamos el plazo de entrega con un método patentado que combina diversos factores, como la proximidad del comprador a la ubicación del artículo, el servicio de envío seleccionado, el historial de envíos del vendedor y otros datos. Los plazos de entrega pueden variar, especialmente en épocas de mucha actividad.
Devoluciones:
30 días para devoluciones. El comprador paga el envío de la devolución..
Pagos:
    Diners Club

Compra con confianza

Garantía al cliente de eBay
Si no recibes el artículo que has pedido, te devolvemos el dinero. Más informaciónGarantía al cliente de eBay - se abre en una nueva ventana o pestaña
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:388659004046
Última actualización el 21 sep 2025 14:15:16 H.EspVer todas las actualizacionesVer todas las actualizaciones

Características del artículo

Estado
Nuevo: Libro nuevo, sin usar y sin leer, que está en perfecto estado; incluye todas las páginas sin ...
ISBN-13
9798214000633
Book Title
CompTIA Security+ Guide to Network Security Fundamentals
ISBN
9798214000633
Categoría

Acerca de este producto

Product Identifiers

Publisher
Cengage Learning
ISBN-10
8214000637
ISBN-13
9798214000633
eBay Product ID (ePID)
12061828708

Product Key Features

Number of Pages
608 Pages
Language
English
Publication Name
Comptia Security+ Guide to Network Security Fundamentals
Subject
Security / General
Publication Year
2024
Type
Textbook
Subject Area
Computers
Author
Mark Ciampa
Series
Mindtap Course List Ser.
Format
Trade Paperback

Dimensions

Item Height
10.8 in
Item Weight
43.2 Oz
Item Length
0.9 in
Item Width
8.4 in

Additional Product Features

Edition Number
8
Intended Audience
College Audience
Dewey Edition
23
Dewey Decimal
005.8
Table Of Content
I. SECURITY FOUNDATIONS.1. Introduction to Information Security.a. What is Information Security?i. Understanding Security.ii. Principles of Security.iii. Cybersecurity Versus Information Security.iv. Defining Information Security.b. Threat actors and Their Motivations.i. Unskilled Attackers.ii. Shadow IT.iii. Organized Crime.iv. Insider Threats.v. Hacktivists.vi. Nation-state Actors.vii. Other Threat Actors.c. How Attacks Occur.i. Threat Vectors and Attack Surfaces.ii. Categories of Vulnerabilities.iii. Impacts of Attacks.d. Information Security Resources.i. Frameworks.ii. Regulations.iii. Legislation.iv. Standards.v. Benchmarks/Secure Configuration Guides.vi. Information Sources.2. Pervasive Attack Surfaces and Controls.a. Social Engineering Attacks.i. Examples of Human Manipulation.ii. Types of Social Engineering Attacks.b. Physical Security Controls.i. Perimeter Defenses.ii. Preventing Data Leakage.iii. Computer Hardware Security.c. Data Controls.i. Data Classifications.ii. Types of Data.iii. Data Breach Consequences.iv. Protecting Data.II. CRYPTOGRAPHY.3. Fundamentals of Cryptography.a. Defining Cryptography.i. Steganography: Hiding the message.ii. Cryptography: Hiding the meaning.iii. Benefits of Cryptography.b. Cryptographic Algorithms.i. Variations of Algorithms.ii. Hash Algorithms.iii. Symmetric Cryptographic Algorithms.iv. Asymmetric Cryptographic Algorithms.c. Using Cryptography.i. Encryption Through Software.ii. Hardware Encryption.iii. Blockchain.d. Cryptographic Limitations and Attacks.i. Limitations of Cryptography.ii. Attacks on Cryptography.4. Advanced Cryptography.a. Digital Certificates.i. Defining Digital Certificates.ii. Managing Digital Certificates.iii. Types of Digital Certificates.b. Public Key Infrastructure (PKI).i. What is Public Key Infrastructure (PKI)?ii. Trust Models.iii. Managing PKI.iv. Key Management.c. Secure Communication and Transport Protocols.i. Transport Layer Security (TLS).ii. IP Security (IPSec).iii. Other Protocols.d. Implementing Cryptography.i. Key Strength.ii. Secret Algorithms.iii. Block Cipher Modes of Operation.III. DEVICE SECURITY.5. Endpoint Vulnerabilities, Attacks, and Defenses.a. Malware Attacks.i. Kidnap.ii. Eavesdrop.iii. Masquerade.iv. Launch.v. Sidestep.vi. Indicator of Attack (IoA).b. Application Vulnerabilities and Attacks.i. Application Vulnerabilities.ii. Application Attacks.c. Securing Endpoint Devices.i. Protecting Endpoints.ii. Hardening Endpoints.6. Mobile and Embedded Device Security.a. Securing Mobile Devices.i. Introduction to Mobile Devices.ii. Mobile Device Risks.iii. Protecting Mobile Devices.b. Embedded Systems and Specialized Devices.i. Types of Devices.ii. Security Considerations.c. Application Security.i. Application Development Concepts.ii. Secure Coding Techniques.iii. Code Testing.7. Identity and Access Management (IAM).a. Types of Authentication Credentials.i. Something You Know: Passwords.ii. Something You Have: Tokens and Security Keys.iii. Something You Are: Biometrics.iv. Something You Do: Behavioral biometrics.b. Authentication Best Practices.i. Securing Passwords.ii. Secure Authentication Technologies.c. Access Controls.i. Access Control Schemes.ii. Access Control Lists.IV. INFRASTRUCTURE AND ARCHITECTURES.8. Infrastructure Threats and Security Monitoring.a. Attacks on Networks.i. On-Path Attacks.ii. Domain Name System (DNS) Attacks.iii. Distributed Denial of Service (DDoS).iv. Malicious Coding and Scripting Attacks.v. Layer 2 Attacks.vi. Credential Relay Attacks.b. Security Monitoring and Alerting.i. Monitoring Methodologies.ii. Monitoring Activities.iii. Tools for Monitoring and Alerting.c. Email Monitoring and Security.i. How Email Works.ii. Email Threats.iii. Email Defenses.9. Infrastructure Security.a. Security Appliances.i. Common Network Devices.ii. Infrastructure Security Hardware.b. Software Security
Synopsis
Reflecting the latest developments and emerging trends from the field, Ciampa's COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 8th Edition, helps you prepare for professional certification and career success. The text fully maps to the new CompTIA Security+ SY0-701 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the 8th edition includes expanded coverage of information security management, artificial intelligence, compliance, cryptography and cloud and virtualization security. Practical, Hands-On Projects, case activities and online virtual labs help you put what you learn into real-world practice.

Descripción del artículo del vendedor

Información de vendedor profesional

Certifico que todas mis actividades de venta cumplirán todas las leyes y reglamentos de la UE.
Acerca de este vendedor

grandeagleretail

98,5% de votos positivos2,8 millones artículos vendidos

Se unió el sep 2010
Suele responder en 24 horas
Registrado como vendedor profesional
Grand Eagle Retail is your online bookstore. We offer Great books, Great prices and Great service.
Visitar tiendaContactar

Valoraciones detalladas sobre el vendedor

Promedio durante los últimos 12 meses
Descripción precisa
4.9
Gastos de envío razonables
5.0
Rapidez de envío
5.0
Comunicación
4.9

Votos de vendedor (1.062.009)

Todas las valoraciones
Positivas
Neutras
Negativas
  • c***a (121)- Votos emitidos por el comprador.
    Últimos 6 meses
    Compra verificada
    The seller was very responsive and answered me on a timely matter. The product itself came in its packaging and was new, not used at all. The packaging was not beat up or anything, safely delivered to my mailbox. No mix ups and zero stress with delivery. The price for the product is completely understandable for the product. I really appreciate the seller and I am very happy to have purchased through this seller. Completely trustable!
  • m***4 (1611)- Votos emitidos por el comprador.
    Últimos 6 meses
    Compra verificada
    Leaving positive feedback because 1) item was packed well & arrived as described 2) seller did give partial refund when subsequent price dropped below org purchase price. 3) communication was quick However, there was a downside to this transaction -item listed as in-stock but ended up waiting nearly a month for them to get it from their distributer then ship it to me (bought June 29th, arrived around July 21). Auction said 12-15 days. Better clarity would have prevented lot of frustration
  • w***i (880)- Votos emitidos por el comprador.
    Últimos 6 meses
    Compra verificada
    Absolutely Wonderful Seller!! Terrific Item As Described!!! Great Service and Communication!! Shipped In Waterproof Packaging!! I Received Item In About One Week!! Very Pleased With Seller! I Will Buy From This Seller Again!!
Ver todos los votos