
CIWTM: Security Professional Study Guide: Exam 1D0-470
by James Stanger; Patrick T. Lane; Tim Crothers (ITM Technologies, Grand Rapids, Michigan)-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
Summary
Table of Contents
Introduction | |
Assessment Test | |
What Is Security? | |
Applied Encryption | |
Types of Attacks | |
General Security Principles | |
Firewalls Roles and Types | |
Firewall Topologies and Virtual Private Networks | |
Detecting and Distracting Hackers | |
Operating System Security | |
File System Security | |
Assessing and Reducing Risk | |
The Auditing Process | |
Auditing Penetration and Control Strategies | |
Intrusion Detection | |
Auditing and Log Analysis | |
Recommending Solutions and Generating Reports | |
Sample Security Audit Report | |
A Sample Enterprise Scanner Report | |
Internet Security Resources | |
Glossary | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.