GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition
Autor Ric Messieren Limba Engleză Paperback – 18 aug 2019
Fully updated coverage of every topic on the current version of the GSEC exam
Get complete coverage of all the objectives on Global Information Assurance Certification’s Security Essentials (GSEC) exam inside this comprehensive resource. GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference.
Covers all exam topics, including:
•Networking fundamentals
•Network design
•Cloud computing
•Authentication and access control
•Unix/Linux
•Windows
•Encryption
•Risk management
•Virtual machines
•Vulnerability control
•Malware
•Incident response
•Wireless technologies
•Log Management
•IoT and embedded devices
Online content features:
•Two practice exams
•Test engine that provides full-length practice exams and customizable quizzes
•Author videos
Preț: 310.97 lei
Preț vechi: 426.77 lei
-27% Nou
Puncte Express: 466
Preț estimativ în valută:
59.51€ • 61.40$ • 50.37£
59.51€ • 61.40$ • 50.37£
Carte tipărită la comandă
Livrare economică 06-12 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781260453201
ISBN-10: 1260453200
Pagini: 608
Dimensiuni: 188 x 231 x 28 mm
Greutate: 1.04 kg
Ediția:2
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States
ISBN-10: 1260453200
Pagini: 608
Dimensiuni: 188 x 231 x 28 mm
Greutate: 1.04 kg
Ediția:2
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States
Cuprins
Chapter 1: Information Security and the GIAC Security Essentials Certification
Chapter 2: Networking Fundamentals
Chapter 3: Network Design
Chapter 4: Authentication and Access Control
Chapter 5: Cloud Computing
Chapter 6: Unix/Linux
Chapter 7: Windows
Chapter 8: Encryption
Chapter 9: Risk Management
Chapter 10: Virtual Machines
Chapter 11: Vulnerability Control
Chapter 12: Malware
Chapter 13: Incident Response
Chapter 14: Wireless Technologies
Chapter 15: Log Management
Chapter 16: IoT and Embedded Devices
Chapter 2: Networking Fundamentals
Chapter 3: Network Design
Chapter 4: Authentication and Access Control
Chapter 5: Cloud Computing
Chapter 6: Unix/Linux
Chapter 7: Windows
Chapter 8: Encryption
Chapter 9: Risk Management
Chapter 10: Virtual Machines
Chapter 11: Vulnerability Control
Chapter 12: Malware
Chapter 13: Incident Response
Chapter 14: Wireless Technologies
Chapter 15: Log Management
Chapter 16: IoT and Embedded Devices