Skip to content
Scan a barcode
Scan
Paperback Principles of Computer Security Book

ISBN: 0071835970

ISBN13: 9780071835978

Principles of Computer Security

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA's fastest-growing credential, CompTIA Security+.Principles of Computer Security, Fourth Edition is a student-tested, introductory computer security textbook that provides comprehensive coverage of computer and network security fundamentals in an engaging and dynamic full-color design.

In addition to teaching key computer security concepts, the textbook also fully prepares you for CompTIA Security+ exam SY0-401 with 100% coverage of all exam objectives. Each chapter begins with a list of topics to be covered and features sidebar exam and tech tips, a chapter summary, and an end-of-chapter assessment section that includes key term, multiple choice, and essay quizzes as well as lab projects. Electronic content includes CompTIA Security+ practice exam questions and a PDF copy of the book.

Key features:

CompTIA Approved Quality Content (CAQC) Electronic content features two simulated practice exams in the Total Tester exam engine and a PDF eBook Supplemented by Principles of Computer Security Lab Manual, Fourth Edition, available separately White and Conklin are two of the most well-respected computer security educators in higher educationInstructor resource materials for adopting instructors include: Instructor Manual, PowerPoint slides featuring artwork from the book, and a test bank of questions for use as quizzes or exams Answers to the end of chapter sections are not included in the book and are only available to adopting instructors

Learn how to:

Ensure operational, organizational, and physical securityUse cryptography and public key infrastructures (PKIs)Secure remote access, wireless networks, and virtual private networks (VPNs)Authenticate users and lock down mobile devicesHarden network devices, operating systems, and applicationsPrevent network attacks, such as denial of service, spoofing, hijacking, and
password guessingCombat viruses, worms, Trojan horses, and rootkitsManage e-mail, instant messaging, and web securityExplore secure software development requirementsImplement disaster recovery and business continuity measuresHandle computer forensics and incident responseUnderstand legal, ethical, and privacy issues

Recommended

Format: Paperback

Temporarily Unavailable

1 person is interested in this title.

We receive 3 copies every 6 months.

Customer Reviews

0 rating
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured