Difference between revisions of "About Security+ Essentials"
m (Text replacement - "<google>BUY_SECURITYPLUS</google>" to "<htmlet>securityplus</htmlet>") |
m (Text replacement - "<table border="0" cellspacing="0" width="100%">" to "<table border="0" cellspacing="0">") |
||
Line 1: | Line 1: | ||
− | <table border="0" cellspacing="0 | + | <table border="0" cellspacing="0"> |
<tr> | <tr> | ||
<td width="20%">[[Security+ Essentials|Previous]]<td align="center">[[Security+ Essentials|Table of Contents]]<td width="20%" align="right">[[Mandatory, Discretionary, Role and Rule Based Access Control|Next]]</td> | <td width="20%">[[Security+ Essentials|Previous]]<td align="center">[[Security+ Essentials|Table of Contents]]<td width="20%" align="right">[[Mandatory, Discretionary, Role and Rule Based Access Control|Next]]</td> |
Revision as of 14:27, 5 May 2016
Previous | Table of Contents | Next |
Table of Contents | Mandatory, Discretionary, Role and Rule Based Access Control |
Purchase and download the full PDF and ePub versions of this Security+ eBook for only $8.99 |
Ever since people started to connect computer systems together (be it via local area networks, wide area networks or the internet) the issue of IT Security has become a matter of concern for everyone, including the home user all the way up to the global enterprise. Without a comprehensive information security strategy individuals and organization are at risk of compromised confidential data and loss of business as a result of malicious damage to operating systems and data.
Security+ Essentials is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ exam. That said, the book is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.
Security+ Essentials is largely a platform agnostic book and as such many of the concepts described apply equally to a range of popular operating systems including Windows, Linux, MacOS X and UNIX.
On completion of this book it is intended that the reader will have a clear understanding of both the threats faced by IT infrastructures together with a basic understanding of the steps involved in planning and implementing a comprehensive multi-layered IT security strategy.