- Introduction to Computer Security
-
By
Chuck Easttom
- Nov 15, 2019
In this sample chapter from Computer Security Fundamentals, 4th Edition, you will learn how to identify the top threats to a network: security breaches, denial of service attacks, and malware.
|
- Introduction to Help Desk Support Roles
-
By
Darril Gibson
- Nov 19, 2014
- This chapter from Effective Help Desk Specialist Skills introduces the support center, help desk professionals, users, and incidents (or problems) in four major sections: Understanding the Support Center,
The Role of the Help Desk Professional, Understanding Users, and Typical Incident Process.
|
- Introduction to the World of IT
-
By
Cheryl A. Schmidt, Christopher Lee
- Feb 25, 2026
|
- Introduction to the World of IT
-
By
Christopher Lee, Cheryl A. Schmidt
- Oct 25, 2022
Many IT roles require detailed knowledge of PC hardware and software. In this sample chapter from Complete A+ Guide to IT Hardware and Software: CompTIA A+ Exams 220-1101 & 220-1102, 9th Edition, you will explore what skills a computer technician needs to perform well on the job, plus exam preparation tips for the CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102).
|
- It's Hard to Overstate the Value of Good Communication Skills in IT
-
By
Ed Tittel
- Mar 14, 2015
- Ed Tittel discusses the value of oral and written communication "soft skills" in the IT workplace, and suggests resources to help you improve your skills.
|
- Linux File Management Basics
-
By
Ross Brunson, Sean Walberg
- Jan 13, 2016
- This chapter from CompTIA Linux+ / LPIC-1 Cert Guide: (Exams LX0-103 & LX0-104/101-400 & 102-400) covers Linux file system management as it pertains to the objectives on the CompTIA Linux+ / LPIC-1 exam.
|
- Manage Software Configurations
-
By
William Rothwell
- Jan 9, 2023
This chapter from CompTIA Linux+ XK0-005 Exam Cram covers XK0-005 Objective: 1.7: Given a scenario, manage software configurations.
|
- Managing and Understanding the Boot Procedure
-
By
Sander van Vugt
- Nov 18, 2021
In this sample chapter from Red Hat RHCSA 8 Cert Guide: EX200, 2nd Edition, you will learn about Systemd targets and how the boot procedure on Red Hat Enterprise Linux is organized.
|
- Managing Group Accounts in Ubuntu
-
By
William Rothwell, Denise Kinsey
- Oct 21, 2018
- Work through labs that demonstrate how to manage group accounts, including how to add, modify, and delete groups, on the Ubuntu operating system.
|
- Mobile App Investigations
-
By
Darren R. Hayes
- Oct 1, 2020
In this sample chapter from A Practical Guide to Digital Forensics Investigations, 2nd Edition, you will explore the importance of mobile apps in investigations, learn how to perform a static and dynamic analysis, analyze SQLite databases, and more.
|
- Mobile Device Accessories and Ports
-
By
Dave Prowse
- Sep 24, 2022
This sample chapter from CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram, covers A+ 220-1101 Objective 1.3: Given a scenario, set up and configure accessories and ports of mobile devices.
|
- Network Implementation of Protocols and Services
-
By
Diane Barrett, Kirk Hausman, Martin Weiss
- Mar 10, 2015
- This chapter from CompTIA Security+ SY0-401 Exam Cram, 4th Edition discusses how to use the proper network implementation of protocols and services as a tool to protect and mitigate threats against network infrastructure based on organizational needs. It also has a section specifically dedicated to wireless security implementation based on organization requirements.
|
- Network Implementations
-
By
Emmett Dulaney
- Oct 12, 2021
In this sample chapter from CompTIA Network+ N10-008 Exam Cram, 7th Edition, you will learn how to compare and contrast various devices, their features, and their appropriate placement on the network.
|
- Network Perimeter Security
-
By
David Prowse
- Feb 21, 2018
In this sample chapter from CompTIA Security+ SY0-501 Cert Guide, Academic Edition, 2nd Edition, explore one of the most strategic pieces in your network security design—the firewall.
|
- Network Topologies, Architectures, and Types
-
By
Emmett Dulaney
- Dec 27, 2024
|
- Operating System Hardening
-
By
William Easttom
- Dec 24, 2023
In this sample chapter from Network Defense and Countermeasures, 4th Edition, you will learn how to configure Windows and Linux systems for secure operations, apply operating system patches and application patches, and securely configure a web browser.
|
- Physical and Environmental Security
-
By
Omar Santos
- Jan 9, 2019
In this sample chapter from Developing Cybersecurity Programs and Policies, 3rd Edition, you will explore design, obstacles, monitoring, and response as they relate to secure areas, equipment security, and environmental controls.
|
- Physical Interfaces and Cabling Types
-
By
Anthony J. Sequeira
- Aug 19, 2020
In this sample chapter from CCNA 200-301 Exam Cram, 6th Edition, you will review essential terms and components of the Network Fundamentals section of the CCNA 200-301 exam, including ethernet, copper media, unshielded twisted pair (UTP), fiber media, Cat 5e, Cat 6, Auto MDI-X, and PoE.
|
- PL/SQL Concepts
-
By
Benjamin Rosenzweig, Elena Rakhimov
- Jul 3, 2023
|
- Planning and Designing 802.11 Wireless Technologies
-
By
Roger Nobel, Federico Lovison, Fabian Riesen, Erik Vangrunderbeek, Federico Ziliotto
- May 16, 2012
- On top of normal networking issues, WLAN adds a couple of new challenges, such as Layer 1 (radio frequency [RF]) issues; a set of L2 protocols, such as IEEE 802.11; and the need for agencies to regulate the use of this shared medium, as the authors explain in this excerpt from their book, CCIE Wireless Exam (350-050) Quick Reference.
|