Cantitate/Preț
Produs

GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition

Autor Ric Messier
en Limba Engleză Paperback – 18 aug 2019
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.



Fully updated coverage of every topic on the current version of the GSEC exam



Get complete coverage of all the objectives on Global Information Assurance Certification’s Security Essentials (GSEC) exam inside this comprehensive resource. GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference.

Covers all exam topics, including:
•Networking fundamentals
•Network design
•Cloud computing
•Authentication and access control
•Unix/Linux
•Windows
•Encryption
•Risk management
•Virtual machines
•Vulnerability control
•Malware
•Incident response
•Wireless technologies
•Log Management
•IoT and embedded devices

Online content features:
•Two practice exams
•Test engine that provides full-length practice exams and customizable quizzes 
•Author videos




Citește tot Restrânge

Preț: 31097 lei

Preț vechi: 42677 lei
-27% Nou

Puncte Express: 466

Preț estimativ în valută:
5951 6140$ 5037£

Carte tipărită la comandă

Livrare economică 06-12 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781260453201
ISBN-10: 1260453200
Pagini: 608
Dimensiuni: 188 x 231 x 28 mm
Greutate: 1.04 kg
Ediția:2
Editura: McGraw Hill Education
Colecția McGraw-Hill
Locul publicării:United States

Cuprins

Chapter 1: Information Security and the GIAC Security Essentials Certification
Chapter 2: Networking Fundamentals
Chapter 3: Network Design
Chapter 4: Authentication and Access Control
Chapter 5: Cloud Computing
Chapter 6: Unix/Linux
Chapter 7: Windows
Chapter 8: Encryption
Chapter 9: Risk Management
Chapter 10: Virtual Machines
Chapter 11: Vulnerability Control
Chapter 12: Malware
Chapter 13: Incident Response
Chapter 14: Wireless Technologies
Chapter 15: Log Management
Chapter 16: IoT and Embedded Devices