- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Publisher's Noteguaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The Best Fully Integrated Study System Available for Exam CAS-001With hundreds of practice questions and lab exercises, CASP CompTIA Advanced Security Practitioner Certification Study Guide covers what you need to know-and shows you how to prepare-for this challenging exam. McGraw-Hill is a Gold-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content. 100% complete coverage of all official objectives for the exam Exam Readiness Checklist-you're ready for the exam when all objectives on the list are checked offInside the Exam sections highlight key exam topics coveredTwo-Minute Drills for quick review at the end of every chapter Simulated exam questions match the format, tone, topics, and difficulty of the multiple-choice exam questionsCovers all the exam topics, including:Cryptographic tools * Computing platforms * Enterprise storage * Infrastructure * Host security controls * Application security * Security assessments * Risk implications * Risk management strategy and controls * E-discovery, data breaches, and incident response * Security and privacy policies * Industry trends * Enterprise security * People and security * Change control * Security controls for communication and collaboration * Advanced authentication tools, techniques, and concepts * Security activities across the technology life cycleElectronic content includes:Complete MasterExam practice testing engine, featuring:-One practice exam-Detailed answers with explanations-Score Report performance assessment toolOne-hour segment of LearnKey video trainingwith free online registration: -Bonus downloadable MasterExam practice test-Downloadable PDF copy of the book for studying on the go
Contents
Part IChapter 1: Cryptographic ToolsChapter 2: Computing PlatformsChapter 3: Enterprise StorageChapter 4: InfrastructureChapter 5: Host Security ControlsChapter 6: Application SecurityChapter 7: Security AssessmentsPart II: Risk Management, Policy/Procedure, and LegalChapter 8: Analyze Risk ImplicationsChapter 9: Risk Management Strategy and ControlsChapter 10: E-discovery, Data Breaches and Incident ResponseChapter 11: Security and Privacy PoliciesPart III: Research and AnalysisChapter 12: Industry TrendsChapter 13: Enterprise SecurityPart IV: Integration of Computing, Communications and Business DisciplinesChapter 14: People and SecurityChapter 15: Change ControlChapter 16: Security Controls for Communication and CollaborationChapter 17: Advanced Authentication Tools, Techniques and ConceptsChapter 18: Security Activities Across the Technology Life CycleAppendix A: About the CD-ROMGlossaryNER(01): WOW