Difference between revisions of "About Security+ Essentials"

From Techotopia
Jump to: navigation, search
m (Text replacement - "<google>BUY_SECURITYPLUS</google>" to "<htmlet>securityplus</htmlet>")
m (Text replacement - "<table border="0" cellspacing="0" width="100%">" to "<table border="0" cellspacing="0">")
Line 1: Line 1:
<table border="0" cellspacing="0" width="100%">
+
<table border="0" cellspacing="0">
 
<tr>
 
<tr>
 
<td width="20%">[[Security+ Essentials|Previous]]<td align="center">[[Security+ Essentials|Table of Contents]]<td width="20%" align="right">[[Mandatory, Discretionary, Role and Rule Based Access Control|Next]]</td>
 
<td width="20%">[[Security+ Essentials|Previous]]<td align="center">[[Security+ Essentials|Table of Contents]]<td width="20%" align="right">[[Mandatory, Discretionary, Role and Rule Based Access Control|Next]]</td>

Revision as of 14:27, 5 May 2016

PreviousTable of ContentsNext
Table of ContentsMandatory, Discretionary, Role and Rule Based Access Control

Purchase and download the full PDF and ePub versions of this Security+ eBook for only $8.99

Ever since people started to connect computer systems together (be it via local area networks, wide area networks or the internet) the issue of IT Security has become a matter of concern for everyone, including the home user all the way up to the global enterprise. Without a comprehensive information security strategy individuals and organization are at risk of compromised confidential data and loss of business as a result of malicious damage to operating systems and data.

Security+ Essentials is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ exam. That said, the book is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.

Security+ Essentials is largely a platform agnostic book and as such many of the concepts described apply equally to a range of popular operating systems including Windows, Linux, MacOS X and UNIX.

On completion of this book it is intended that the reader will have a clear understanding of both the threats faced by IT infrastructures together with a basic understanding of the steps involved in planning and implementing a comprehensive multi-layered IT security strategy.