Introduction |
|
xv | |
|
PART I DOMAIN 1.0: IT CONCEPTS AND TERMINOLOGY |
|
|
1 | (48) |
|
Chapter 1 Notational Systems |
|
|
3 | (8) |
|
|
11 | (8) |
|
Chapter 3 Computing Basics |
|
|
19 | (6) |
|
|
25 | (8) |
|
Chapter 5 Units of Measure |
|
|
33 | (8) |
|
Chapter 6 Troubleshooting Methodology |
|
|
41 | (8) |
|
PART II DOMAIN 2.0: INFRASTRUCTURE |
|
|
49 | (94) |
|
Chapter 7 Input/Output Device Interfaces |
|
|
51 | (10) |
|
Chapter 8 Installing Peripherals |
|
|
61 | (8) |
|
Chapter 9 Internal Computing Components |
|
|
69 | (10) |
|
Chapter 10 Internet Service Types |
|
|
79 | (6) |
|
|
85 | (10) |
|
Chapter 12 Computing Devices |
|
|
95 | (12) |
|
Chapter 13 TCP/IP Networking |
|
|
107 | (10) |
|
Chapter 14 Application Protocols |
|
|
117 | (6) |
|
Chapter 15 Network Devices |
|
|
123 | (8) |
|
Chapter 16 Wireless Networks |
|
|
131 | (12) |
|
PART III DOMAIN 3.0: APPLICATIONS AND SOFTWARE |
|
|
143 | (74) |
|
Chapter 17 Operating Systems |
|
|
145 | (8) |
|
Chapter 18 Virtualization |
|
|
153 | (6) |
|
|
159 | (10) |
|
Chapter 20 Services and Processes |
|
|
169 | (6) |
|
Chapter 21 Drivers, Utilities, and Interfaces |
|
|
175 | (8) |
|
Chapter 22 Software Types |
|
|
183 | (10) |
|
Chapter 23 Application Architecture and Delivery |
|
|
193 | (6) |
|
|
199 | (12) |
|
Chapter 25 Application Concepts and Uses |
|
|
211 | (6) |
|
PART IV DOMAIN 4.0: SOFTWARE DEVELOPMENT CONCEPTS |
|
|
217 | (32) |
|
Chapter 26 Programming Languages |
|
|
219 | (8) |
|
Chapter 27 Programming Organizational Techniques |
|
|
227 | (6) |
|
Chapter 28 Logic Components |
|
|
233 | (6) |
|
Chapter 29 Programming Concepts |
|
|
239 | (10) |
|
PART V DOMAIN 5.0: DATABASE FUNDAMENTALS |
|
|
249 | (28) |
|
Chapter 30 Database Concepts |
|
|
251 | (8) |
|
Chapter 31 Database Structures |
|
|
259 | (10) |
|
Chapter 32 Database Interfaces |
|
|
269 | (8) |
|
PART VI DOMAIN 6.0: SECURITY |
|
|
277 | (54) |
|
Chapter 33 Confidentiality, Integrity, and Availability |
|
|
279 | (8) |
|
Chapter 34 Securing Devices |
|
|
287 | (6) |
|
Chapter 35 Behavioral Security |
|
|
293 | (6) |
|
Chapter 36 Authentication, Authorization, Accounting, and Nonrepudiation |
|
|
299 | (14) |
|
Chapter 37 Password Best Practices |
|
|
313 | (6) |
|
|
319 | (6) |
|
Chapter 39 Business Continuity and Disaster Recovery |
|
|
325 | (6) |
Index |
|
331 | |