Security + Exam Guide (Charles River Media Networking/Security)
Chapter 3: Communications Security
- Figure 3.1: 802.1X authentication.
Chapter 4: Infrastructure Security
- Figure 4.1: A linear bus topology network
- Figure 4.2: A star topology network
- Figure 4.3: A ring topology network
- Figure 4.4: A mesh topology network
Chapter 6: Operational/Organizational Security
- Figure 6.1: Windows 2000 Professional local rights.
- Figure 6.2: The Windows NT User Manager.
Chapter 7: Applications and Systems Development
- Figure 7.1: Internet Explorer security settings.
- Figure 7.2: The CIA Triad.
- Figure 7.3: Steps of the SDLC process.
- Figure 7.4: Modes of operation.