Security+ Essentials
Publisher: Techotopia 2008
Description:
Online book designed for people studying for the CompTIA Security+ exam and for those interested in learning key issues of designing and implementing secure IT environments. Many of the concepts in this book apply equally to a range of popular operating systems including Windows, Linux, UNIX, and MacOS X. On completion of this book the reader will have a clear understanding of both the threats faced by IT infrastructures and the steps involved in planning and implementing a comprehensive multi-layered IT security strategy.
Download or read it online for free here:
Read online
(online html)
Similar books
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by Lillian Ablon, Martin C. Libicki, Andrea A. Golay - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7724 views)
by Lillian Ablon, Martin C. Libicki, Andrea A. Golay - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7724 views)
Policing Cyber Crime
by Petter Gottschalk - BookBoon
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
(14270 views)
by Petter Gottschalk - BookBoon
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
(14270 views)
Cyber Infrastructure Protection
by Tarek N. Saadawi, Louis H. Jordan Jr. - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(11351 views)
by Tarek N. Saadawi, Louis H. Jordan Jr. - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(11351 views)
Security Engineering: A Guide to Building Dependable Distributed Systems
by Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(18687 views)
by Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(18687 views)