Logo

Security+ Essentials

Small book cover: Security+ Essentials

Security+ Essentials

Publisher: Techotopia

Description:
Online book designed for people studying for the CompTIA Security+ exam and for those interested in learning key issues of designing and implementing secure IT environments. Many of the concepts in this book apply equally to a range of popular operating systems including Windows, Linux, UNIX, and MacOS X. On completion of this book the reader will have a clear understanding of both the threats faced by IT infrastructures and the steps involved in planning and implementing a comprehensive multi-layered IT security strategy.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Rethinking Public Key Infrastructures and Digital CertificatesRethinking Public Key Infrastructures and Digital Certificates
by - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
(13371 views)
Book cover: Cryptography and Data SecurityCryptography and Data Security
by - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
(19933 views)
Book cover: Provable Security of NetworksProvable Security of Networks
by - arXiv
We propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks.
(11259 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(23561 views)