skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
CompTIA Security+ Study Guide : Exam SY0-501. Preview this item
ClosePreview this item
Checking...

CompTIA Security+ Study Guide : Exam SY0-501.

Author: Emmett Dulaney; Chuck Easttom
Publisher: Newark : John Wiley & Sons, Incorporated, 2017.
Edition/Format:   eBook : Document : English : 7th edView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Dulaney, Emmett.
CompTIA Security+ Study Guide : Exam SY0-501.
Newark : John Wiley & Sons, Incorporated, ©2017
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Emmett Dulaney; Chuck Easttom
ISBN: 9781119416906 1119416906
OCLC Number: 1006417112
Notes: ""ABAC""
Description: 1 online resource (515 pages)
Contents: CompTIA® Security+® Study Guide --
Acknowledgments --
About the Authors --
Contents at a Glance --
Contents --
Table of Exercises --
Introduction --
Assessment Test --
Answers to Assessment Test --
Chapter 1 Managing Risk --
Risk Terminology --
Threat Assessment --
Risk Assessment --
Computing Risk Assessment --
Assessing Privacy --
Acting on Your Risk Assessment --
Risks Associated with Cloud Computing --
Risks Associated with Virtualization --
Developing Policies, Standards, and Guidelines --
Implementing Policies Understanding Control Types and False Positives/NegativesRisk Management Best Practices --
Change Management --
Summary --
Exam Essentials --
Review Questions --
Chapter 2 Monitoring and Diagnosing Networks --
Monitoring and Diagnosing Networks Terminology --
Frameworks, Best Practices, and Configuration Guides --
Industry-Standard Frameworks and Reference Architectures --
National Institute of Standards and Technology (NIST) --
Benchmarks/Secure Configuration Guides --
Secure Network Architecture Concepts --
Zones --
Tunneling/VPN Placing Security DevicesSDN --
IDS vs. IPS --
Secure Systems Design --
Hardware and Firmware Security --
Operating Systems --
Peripherals --
Secure Staging Deployment Concepts --
Summary --
Exam Essentials --
Review Questions --
Chapter 3 Understanding Devices and Infrastructure --
Infrastructure Terminology --
Designing with Security in Mind --
Firewalls --
VPNs and VPN Concentrators --
Intrusion Detection Systems --
Router --
Switch --
Proxy --
Load Balancer --
Access Point --
SIEM --
DLP --
Network Access Control (NAC) --
Mail Gateway BridgeSSL/TLS Accelerators --
SSL Decryptors --
Media Gateway --
Hardware Security Module --
Summary --
Exam Essentials --
Review Questions --
Chapter 4 Identity and Access Management --
Using Tools to Assess Your Network --
Protocol Analyzer --
Network Scanners --
Password Cracker --
Vulnerability Scanners --
Command-Line Tools --
Additional Tools --
Troubleshooting Common Security Issues --
Access Issues --
Configuration Issues --
Security Technologies --
Intrusion Detection Systems --
Antimalware --
Firewalls and Related Devices Other SystemsIdentity and Access Management Concepts --
Identification vs. Authentication --
Authentication (Single Factor) and Authorization --
Multifactor Authentication --
Biometrics --
Federations --
Potential Authentication and Access Problems --
LDAP --
PAP, SPAP, and CHAP --
Kerberos --
Working with RADIUS --
TACACS, TACACS+, XTACACS --
OATH --
One-Time Passwords --
SAML --
Install and Configure Identity and Access Services --
Mandatory Access Control --
Discretionary Access Control --
Role-Based Access Control --
Rule-Based Access Control

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1006417112<\/a>> # CompTIA Security+ Study Guide : Exam SY0-501.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:MediaObject<\/a>, schema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1006417112<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/nju<\/a>> ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5547673030#Place\/newark<\/a>> ; # Newark<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:bookEdition<\/a> \"7th ed.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5547673030#Person\/easttom_chuck<\/a>> ; # Chuck Easttom<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5547673030#Person\/dulaney_emmett<\/a>> ; # Emmett Dulaney<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2017<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"CompTIA\u00C2\u00AE Security+\u00C2\u00AE Study Guide -- Acknowledgments -- About the Authors -- Contents at a Glance -- Contents -- Table of Exercises -- Introduction -- Assessment Test -- Answers to Assessment Test -- Chapter 1 Managing Risk -- Risk Terminology -- Threat Assessment -- Risk Assessment -- Computing Risk Assessment -- Assessing Privacy -- Acting on Your Risk Assessment -- Risks Associated with Cloud Computing -- Risks Associated with Virtualization -- Developing Policies, Standards, and Guidelines -- Implementing Policies<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/5547673030<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Electronic books<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/worldcat.org\/entity\/work\/data\/5547673030#CreativeWork\/comptia_security+_study_guide_exam_sy0_501<\/a>> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"CompTIA Security+ Study Guide : Exam SY0-501.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1006417112<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1006417112#PublicationEvent\/newark_john_wiley_&_sons_incorporated_2017<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5547673030#Agent\/john_wiley_&_sons_incorporated<\/a>> ; # John Wiley & Sons, Incorporated<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/public.ebookcentral.proquest.com\/choice\/publicfullrecord.aspx?p=5097139<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781119416906<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1006417112<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.8\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5547673030#Agent\/john_wiley_&_sons_incorporated<\/a>> # John Wiley & Sons, Incorporated<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"John Wiley & Sons, Incorporated<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5547673030#Person\/dulaney_emmett<\/a>> # Emmett Dulaney<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Dulaney<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Emmett<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Emmett Dulaney<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5547673030#Person\/easttom_chuck<\/a>> # Chuck Easttom<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Easttom<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Chuck<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Chuck Easttom<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5547673030#Place\/newark<\/a>> # Newark<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Newark<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/nju<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"nju<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/entity\/work\/data\/5547673030#CreativeWork\/comptia_security+_study_guide_exam_sy0_501<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nrdfs:label<\/a> \"CompTIA Security+ Study Guide : Exam SY0-501.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Print version:<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isSimilarTo<\/a> <http:\/\/www.worldcat.org\/oclc\/1006417112<\/a>> ; # CompTIA Security+ Study Guide : Exam SY0-501.<\/span>\n\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781119416906<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1119416906<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781119416906<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1006417112<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1006417112<\/a>> ; # CompTIA Security+ Study Guide : Exam SY0-501.<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2019-11-05<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1006417112#PublicationEvent\/newark_john_wiley_&_sons_incorporated_2017<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5547673030#Place\/newark<\/a>> ; # Newark<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5547673030#Agent\/john_wiley_&_sons_incorporated<\/a>> ; # John Wiley & Sons, Incorporated<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2017<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n