Difference between revisions of "About Security+ Essentials"

From Techotopia
Jump to: navigation, search
m (Text replacement - "<table border="0" cellspacing="0">" to "<table border="0" cellspacing="0" width="100%">")
 
(3 intermediate revisions by the same user not shown)
Line 7: Line 7:
 
<hr>
 
<hr>
  
 +
<htmlet>securityplus</htmlet>
  
 
Ever since people started to connect computer systems together (be it via local area networks, wide area networks or the internet) the issue of IT Security has become a matter of concern for everyone, including the home user all the way up to the global enterprise. Without a comprehensive information security strategy individuals and organization are at risk of compromised confidential data and loss of business as a result of malicious damage to operating systems and data.
 
Ever since people started to connect computer systems together (be it via local area networks, wide area networks or the internet) the issue of IT Security has become a matter of concern for everyone, including the home user all the way up to the global enterprise. Without a comprehensive information security strategy individuals and organization are at risk of compromised confidential data and loss of business as a result of malicious damage to operating systems and data.

Latest revision as of 20:03, 27 October 2016

PreviousTable of ContentsNext
Table of ContentsMandatory, Discretionary, Role and Rule Based Access Control

Purchase and download the full PDF and ePub versions of this Security+ eBook for only $8.99

Ever since people started to connect computer systems together (be it via local area networks, wide area networks or the internet) the issue of IT Security has become a matter of concern for everyone, including the home user all the way up to the global enterprise. Without a comprehensive information security strategy individuals and organization are at risk of compromised confidential data and loss of business as a result of malicious damage to operating systems and data.

Security+ Essentials is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ exam. That said, the book is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.

Security+ Essentials is largely a platform agnostic book and as such many of the concepts described apply equally to a range of popular operating systems including Windows, Linux, MacOS X and UNIX.

On completion of this book it is intended that the reader will have a clear understanding of both the threats faced by IT infrastructures together with a basic understanding of the steps involved in planning and implementing a comprehensive multi-layered IT security strategy.