Atjaunināt sīkdatņu piekrišanu

E-grāmata: CompTIA Mobility+ Certification All-in-One Exam Guide (Exam MB0-001)

3.40/5 (19 ratings by Goodreads)
  • Formāts: 512 pages
  • Sērija : All-in-One
  • Izdošanas datums: 08-Aug-2014
  • Izdevniecība: McGraw-Hill Professional
  • Valoda: eng
  • ISBN-13: 9780071823968
  • Formāts - PDF+DRM
  • Cena: 45,08 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 512 pages
  • Sērija : All-in-One
  • Izdošanas datums: 08-Aug-2014
  • Izdevniecība: McGraw-Hill Professional
  • Valoda: eng
  • ISBN-13: 9780071823968

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

"A new exam guide for the new certification on mobile computing technologies from CompTIAPrepare for CompTIA Mobility+ exam MB0-001 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.Get complete coverage of all objectives for CompTIA Mobility+ exam MB0-001 from this comprehensive resource. Written by an information security engineer, this authoritative guide fully addresses the skills and technologies required to successfully deploy, integrate, support, and mange a mobile environment. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference.Covers all exam topics, including: Networking concepts and the OSI model Network infrastructure and technologies Radio frequency principles Cellular technologies Wi-Fi client technologies Planning for mobile devices Implementing mobile device infrastructure Mobile security risks Mobile security technologies Troubleshooting network issues Monitoring and troubleshooting mobile security Troubleshooting client issues Electronic content includes: 200 practice exam questions Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain PDF copy of the book "--

"Get complete coverage of all objectives for CompTIA Mobility+ exam MB0-001 from this comprehensive resource. Written by an information security engineer, this authoritative guide fully addresses the skills and technologies required to successfully deploy, integrate, support, and manage a mobile environment. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference. Covers all exam topics, including: - Networking concepts and the OSI model - Network infrastructure and technologies - Radio frequency principles - Cellular technologies - Wi-Fi client technologies - Planning for mobile devices - Implementing mobile device infrastructure - Mobile security risks - Mobile security technologies - Troubleshooting network issues - Monitoring and troubleshooting mobile security - Troubleshooting client issues "--

Acknowledgments xix
Introduction xxi
Chapter 1 Basic Networking Concepts 1(38)
Introduction to Networking
2(6)
How Networks Are Built
2(1)
Basic Terms and Concepts
2(6)
The OSI Model
8(10)
How the OSI Model Works
9(3)
The Physical Layer
12(1)
The Data Link Layer
13(1)
The Network Layer
13(1)
The Transport Layer
14(2)
The Session Layer
16(1)
The Presentation Layer
17(1)
The Application Layer
17(1)
Ports and Protocols
18(13)
How Ports Work
18(4)
Common Protocols and Ports Used in Networks
22(9)
Chapter Review
31(8)
Questions
32(4)
Answers
36(3)
Chapter 2 Network Infrastructure and Technologies 39(42)
Network Devices
39(12)
Common Network Devices
40(5)
Specialized Network Devices
45(6)
Network Topologies
51(11)
Traditional Topologies
51(6)
Topology Design
57(1)
Network Architectures
58(4)
Networking Technologies
62(9)
IP Addressing
62(7)
Network Management
69(2)
Chapter Review
71(10)
Questions
74(4)
Answers
78(3)
Chapter 3 Radio Frequency Principles 81(26)
Radio Frequency Fundamentals
81(8)
Radio Frequency Concepts and Characteristics
82(7)
Exercise
89(3)
RF Propagation
89(3)
Antennas
92(7)
Basic Concepts
92(1)
Antenna Characteristics
92(4)
Types of Antennas
96(3)
Faraday Cages
99(1)
Chapter Review
99(8)
Questions
100(4)
Answers
104(3)
Chapter 4 Cellular Technologies 107(26)
Introduction to Cellular Technologies
107(8)
History
108(1)
Basic Terms and Concepts
109(6)
Signaling Technologies and Standards
115(11)
Code Division Multiple Access
116(1)
Time Division Multiple Access
116(2)
Global System for Mobile Communication (GSM)
118(2)
Third Generation (3G) Technologies
120(2)
Fourth Generation (4G) Technologies
122(3)
Roaming and Switching Between Network Types
125(1)
Chapter Review
126(7)
Questions
128(3)
Answers
131(2)
Chapter 5 Wi-Fi Client Technologies 133(40)
Introduction to Wi-Fi
133(10)
History
134(1)
Basic Terms and Concepts
134(9)
Wi-Fi Standards
143(6)
802.11 Standards
143(6)
Exercise
149(4)
Bluetooth
149(4)
Authentication and Encryption
153(4)
Authentication
153(1)
Encryption
154(1)
WEP
154(1)
WPA
155(1)
802.1X
156(1)
Site Surveys
157(7)
Preparation
158(1)
Capacity
159(1)
Coverage
159(1)
Signal Strength
160(1)
Receive Signal Strength
161(1)
Interference
161(1)
Spectrum Analysis
162(1)
Site Survey Documentation
163(1)
Post Site Survey
164(1)
Exercise
164(1)
Chapter Review
164(9)
Questions
166(4)
Answers
170(3)
Chapter 6 Planning for Mobile Devices 173(52)
Basic Mobile Device Concepts
173(9)
History of Mobile Devices in the Enterprise
174(2)
Comparing Apples to Androids
176(2)
MDM Concepts
178(4)
Policy and the Mobile Infrastructure
182(4)
Organizational IT and Security Policies
182(2)
Vendors, Platforms, and Telecommunications
184(2)
Enterprise Mobile Device Infrastructure Requirements
186(12)
Security Requirements
186(4)
Interoperability and Infrastructure Support
190(3)
Location-Based Services
193(1)
Mobile Application Management
194(4)
Disaster Recovery Principles and the Mobile Infrastructure
198(11)
Business Continuity and Disaster Recovery
199(10)
Best Practices for Mobile Device Data Protection
209(4)
Data Recovery
211(2)
New Technologies and the Enterprise Mobile Infrastructure
213(2)
Chapter Review
215(10)
Questions
218(4)
Answers
222(3)
Chapter 7 Implementing Mobile Device Infrastructure 225(50)
Install and Configure Requirements-Based Mobile Solutions
225(11)
Pre-Installation
226(8)
Deployment Best Practices
234(2)
Mobile Device On-Boarding and Off-Boarding
236(10)
Device Activation
237(1)
Provisioning
238(5)
Off-Boarding and De-Provisioning
243(3)
Implementing Mobile Device Operations and Management
246(10)
Centralized Content and Application Management and Distribution
246(3)
Implementing Remote Capabilities
249(3)
Life-Cycle Operations
252(4)
Configuring and Deploying Mobile Applications and Associated Technologies
256(11)
Messaging Standards
256(2)
Network Configuration
258(2)
Types of Mobile Applications
260(2)
In-House Application Requirements
262(3)
Push Notification Technologies
265(2)
Chapter Review
267(8)
Questions
269(3)
Answers
272(3)
Chapter 8 Mobile Security Risks 275(38)
Mobile Infrastructure Risks
275(24)
Wireless Risks
275(6)
Software Risks
281(5)
Hardware Risks
286(1)
Organizational Risks
287(3)
Mitigation Strategies
290(9)
Incident Response
299(6)
Preparation
299(4)
Response
303(2)
Chapter Review
305(8)
Questions
307(4)
Answers
311(2)
Chapter 9 Mobile Security Technologies 313(38)
Encryption
313(17)
Encryption Basics
314(1)
Data-at-Rest
315(3)
Data-in-Transit
318(8)
Implementing Encryption
326(4)
Access Control
330(13)
Authentication Concepts
330(4)
PKI Concepts
334(1)
Certificate Management
335(5)
Software-Based Container Access and Data Segregation
340(3)
Chapter Review
343(8)
Questions
345(4)
Answers
349(2)
Chapter 10 Troubleshooting Network Issues 351(36)
Troubleshooting Methodology
351(9)
Troubleshooting Steps
352(1)
Identify the Problem
353(3)
Establish a Theory of Probable Cause
356(1)
Testing the Theory to Determine Cause
356(1)
Resolving the Problem
357(1)
Implement
358(1)
Verify
359(1)
Documentation
359(1)
Troubleshooting Network and Over-the-Air Connectivity
360(18)
Basic Connectivity Troubleshooting Tools
361(4)
Common Network Issues
365(9)
Over-the-Air Connectivity Issues
374(4)
Chapter Review
378(9)
Questions
380(4)
Answers
384(3)
Chapter 11 Monitoring and Troubleshooting Mobile Security 387(32)
Monitoring and Reporting
388(6)
Device Compliance and Audit Information Reporting
388(6)
Common Security Problems
394(17)
Certificate Problems
394(5)
Authentication Issues
399(4)
Network Device Problems
403(2)
False Positives and Negatives
405(2)
Other Security Issues
407(4)
Chapter Review
411(8)
Questions
412(4)
Answers
416(3)
Chapter 12 Troubleshooting Client Issues 419(32)
Troubleshooting Device Problems
419(14)
Power Issues
420(5)
Device Issues
425(8)
Troubleshooting Common Application Problems
433(10)
Application Installation and Configuration
434(9)
Chapter Review
443(8)
Questions
444(4)
Answers
448(3)
Appendix About the CD-ROM 451(2)
System Requirements
451(1)
Installing and Running Total Tester
451(1)
About Total Tester
451(1)
Free PDF Copy of the Book
452(1)
Technical Support
452(1)
Glossary 453(10)
Index 463
Bobby E. Rogers is an Information Security Engineer working for a major hospital in the southeastern United States. His previous experience includes working as a contractor for Department of Defense agencies, helping to secure, certify, and accredit their information systems. His duties include information system security engineering, risk management, and certification and accreditation efforts. He retired after 21 years in the United States Air Force, serving as a network security engineer and instructor, and has secured networks all over the world. Bobby has a Masters degree in Information Assurance (IA), and is pursuing a doctoral degree in IA from Capitol College, Maryland. His many certifications include CompTIAs A+, CompTIA Network+, CompTIA Security+, and CompTIA Mobility+ certifications, as well as the CISSP-ISSEP, CEH, and MCSE: Security.