My Account Details

ISBN10: 1260453200 | ISBN13: 9781260453201

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Fully updated coverage of every topic on the current version of the GSEC exam Get complete coverage of all the objectives on Global Information Assurance Certification’s Security Essentials (GSEC) exam inside this comprehensive resource. GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference. Covers all exam topics, including: •Networking fundamentals •Network design •Cloud computing •Authentication and access control •Unix/Linux •Windows •Encryption •Risk management •Virtual machines •Vulnerability control •Malware •Incident response •Wireless technologies •Log Management •IoT and embedded devices Online content features: •Two practice exams •Test engine that provides full-length practice exams and customizable quizzes •Author videos
Chapter 2: Networking Fundamentals
Chapter 3: Network Design
Chapter 4: Authentication and Access Control
Chapter 5: Cloud Computing
Chapter 6: Unix/Linux
Chapter 7: Windows
Chapter 8: Encryption
Chapter 9: Risk Management
Chapter 10: Virtual Machines
Chapter 11: Vulnerability Control
Chapter 12: Malware
Chapter 13: Incident Response
Chapter 14: Wireless Technologies
Chapter 15: Log Management
Chapter 16: IoT and Embedded Devices
Need support? We're here to help - Get real-world support and resources every step of the way.