FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
- Title: Security+ Essentials
- Author(s) Neil Smyth
- Publisher: Payload Media; 1 edition (December 17, 2010); eBook (2012)
- eBook: HTML
- Language: English
- ISBN-10/ASIN: B004GKNMDW
- ISBN-13: N/A
- Share This:
Ever since people started to connect computer systems together (be it via local area networks, wide area networks or the internet) the issue of IT Security has become a matter of concern for everyone, including the home user all the way up to the global enterprise. Without a comprehensive information security strategy individuals and organization are at risk of compromised confidential data and loss of business as a result of malicious damage to operating systems and data.
Security+ Essentials is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ exam. That said, the book is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.
Security+ Essentials is largely a platform agnostic book and as such many of the concepts described apply equally to a range of popular operating systems including Windows, Linux, MacOS X and UNIX.
On completion of this book it is intended that the reader will have a clear understanding of both the threats faced by IT infrastructures together with a basic understanding of the steps involved in planning and implementing a comprehensive multi-layered IT security strategy.
About the Authors- Neil Smyth has written over 20 "Essentials" technical books. Click here to see all his "Essentials" technical books. Neil Smyth lives in Raleigh-Durham, North Carolina Area.
- Computer, Networks, and Information Security
- Hacking and Hackers
- Cryptography, Cryptology, and Cryptanalysis
- Networks Security and Management
- Reverse Engineering
- Computer Forensics, etc.
-
CompTIA Security+ Study Guide (Netwrix)
This book is designed for IT and security professionals who aim to obtain CompTIA Security+ certification. It covers all the certification exam objectives (domains) of the latest version of the exam, Sy0-501.
-
Security Engineering: Building Dependable Distributed Systems
It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.
-
Security Concepts (Subspacefield)
This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.
-
Rational Cybersecurity for Business (Daniel Blum)
This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience.
-
Security of Ubiquitous Computing Systems (Gildas Avoine, et al)
It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.
-
Computer Security Handbook (Seymour Bosworth, et al.)
This handbook has compiled advice about how to minimize the possibility of computer security breaches in your systems. It provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more.
-
Handbook of Information Security Management (Micki Krause)
Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.
-
Open Source Security Tools: A Practical Guide to Security Apps
This book is a practical, hands-on introduction to open source security tools. It reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the "best of breed" for all major areas of information security.
:
|
|