Logo

Security+ Essentials

Small book cover: Security+ Essentials

Security+ Essentials

Publisher: Techotopia

Description:
Online book designed for people studying for the CompTIA Security+ exam and for those interested in learning key issues of designing and implementing secure IT environments. Many of the concepts in this book apply equally to a range of popular operating systems including Windows, Linux, UNIX, and MacOS X. On completion of this book the reader will have a clear understanding of both the threats faced by IT infrastructures and the steps involved in planning and implementing a comprehensive multi-layered IT security strategy.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Safeguarding Your TechnologySafeguarding Your Technology
by - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
(6931 views)
Book cover: Security Engineering: A Guide to Building Dependable Distributed SystemsSecurity Engineering: A Guide to Building Dependable Distributed Systems
by - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(15296 views)
Book cover: IT Security CookbookIT Security Cookbook
by - Boran Consulting
This document defines a security policy, outlines structure of a security organization, presents current security mechanisms, and provides technical guidelines for operating systems, applications and networks used in client/server systems.
(13050 views)
Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(7487 views)