Description |
1 online resource (1 volume) : illustrations |
Contents |
Part 1. Securing the infrastructure. Infrastructure security in the real world -- Understanding access-control and monitoring systems -- Understanding video surveillance systems -- Understanding intrusion-detection and reporting systems -- Infrastructure security : review questions and hands-on exercises -- Part 2. Securing local hosts. Local host security in the real world -- Securing devices -- Protecting the inner perimeter -- Protecting remote access -- Local host security : review questions and hands-on exercises -- Part 3. Securing local networks. Local network security in the real world -- Networking basics -- Understanding networking protocols -- Understanding network servers -- Understanding network connectivity devices -- Understanding network transmission media security -- Local network security : review questions -- Part 4. Securing the perimeter. Perimeter security in the real world -- Understanding the environment -- Hiding the private network -- Protecting the perimeter -- Protecting data moving through the internet -- Tools and utilities -- Identifying and defending against vulnerabilities -- Perimeter security : review questions and hands-on exercises |
Summary |
"Provides an overview of the essential topics required for entry-level cybersecurity certifications, discussing the concepts and practices within securing the infrastructure, devices, local networks and the perimeter."--Provided by publisher |
Analysis |
datasikkerhet datasikring datanettverk sikkerhet lokale datanettverk |
Notes |
Includes index |
|
Online resource; title from title page (Safari, viewed November 18, 2019) |
Subject |
Computer networks -- Security measures.
|
|
Computer security.
|
|
Computer networks -- Security measures
|
|
Computer security
|
Form |
Electronic book
|
Author |
Grow, Christopher, author
|
|
Craig, Philip, author
|
|
Short, Donald, author
|
ISBN |
9781119362456 |
|
1119362458 |
|