My Account Details

ISBN10: 1260441334 | ISBN13: 9781260441338

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Complete coverage of every topic on the CompTIA Advanced Security Practitioner certification exam by the experts! Get complete coverage of all objectives included on the CompTIA CASP+ exam CAS-003 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Also includes a voucher coupon for a 10% discount on your CompTIA exam! Covers all exam domains, including: Threats, attacks, and vulnerabilities Technologies and tools Architecture and design Identity and access management Risk management Cryptography and PKI Online content includes: 200 realistic practice exam questions Interactive performance-based question quiz
Chapter 1: Security Influences and Risk
Chapter 2: Security Policies and Procedures
Chapter 3: Risk Mitigation, Strategies, and Controls
Chapter 4: Risk Metrics
PART II: Enterprise Security Architecture
Chapter 5: Network Security Components, Concepts and Architectures
Chapter 6: Security Controls for Host Devices
Chapter 7: Mobile Security Controls
Chapter 8: Vulnerabilities and Security Controls
PART III: Enterprise Security Operations
Chapter 9: Security Assessment
Chapter 10: Security Assessment Tools
Chapter 11: Incident Response and Recovery Procedures
PART IV: Technical Integration of Enterprise Security
Chapter 12: Hosts, Storage, Networks, and Applications
Chapter 13: Cloud and Virtualization
Chapter 14: Authentication and Authorization
Chapter 15: Cryptographic Techniques
Chapter 16: Securing Communications and Collaboration
PART V: Research, Development and Collaboration
Chapter 17: Research Methods and Industry Trends
Chapter 18: Technology Life Cycles and Security Activities
Chapter 19: Business Unit Interactions
Glossary
Need support? We're here to help - Get real-world support and resources every step of the way.