SlideShare a Scribd company logo
Copyright©2016byMcGraw-
HillEducation.Allrightsreserved.Except
aspermittedundertheUnitedStatesCopyrightActof1976,nopartofth
is
publicationmaybereproducedordistributedinanyformorbyanymea
ns,
orstoredinadatabaseorretrievalsystem,withoutthepriorwritten
permissionofthepublisher,withtheexceptionthattheprogramlisting
s
maybeentered,stored,andexecutedinacomputersystem,buttheyma
y
notbereproducedforpublication.
ISBN:978-0-07-183597-8
MHID:0-07-183597-0
ThematerialinthiseBookalsoappearsintheprintversionofthistitle:
ISBN:978-0-07-183601-2,MHID:0-07-183601-2.
eBookconversionbycodeMantra
Version1.0
Alltrademarksaretrademarksoftheirrespectiveowners.Ratherthan
puta
trademarksymbolaftereveryoccurrenceofatrademarkedname,weus
e
namesinaneditorialfashiononly,andtothebenefitofthetrademark
owner,withnointentionofinfringementofthetrademark.Wheresuch
designationsappearinthisbook,theyhavebeenprintedwithinitialca
ps.
McGraw-
HillEducationeBooksareavailableatspecialquantitydiscounts
touseaspremiumsandsalespromotionsorforuseincorporatetraining
programs.Tocontactarepresentative,pleasevisittheContactUspage
at
www.mhprofessional.com.
SANSInstituteITCodeofEthicsreproducedwithpermission,©SAN
S
Institute.
InformationhasbeenobtainedbyMcGraw-
HillEducationfromsources
believedtobereliable.However,becauseofthepossibilityofhumano
r
mechanicalerrorbyoursources,McGraw-HillEducation,orothers,
http://www.mhprofessional.com
McGraw-
HillEducationdoesnotguaranteetheaccuracy,adequacy,or
completenessofanyinformationandisnotresponsibleforanyerrorso
r
omissionsortheresultsobtainedfromtheuseofsuchinformation.
McGraw-
HillEducationisanindependententityfromCompTIA®.This
publicationanddigitalcontentmaybeusedinassistingstudentstopre
pare
fortheCompTIASecurity+exam.NeitherCompTIAnorMcGraw-
Hill
Educationwarrantsthatuseofthispublicationanddigitalcontentwill
ensurepassinganyexam.CompTIAandCompTIASecurity+are
trademarksorregisteredtrademarksofCompTIAintheUnitedStates
and/orothercountries.Allothertrademarksaretrademarksoftheir
respectiveowners.
TERMSOFUSE
ThisisacopyrightedworkandMcGraw-
HillEducationanditslicensors
reserveallrightsinandtothework.Useofthisworkissubjecttothese
terms.ExceptaspermittedundertheCopyrightActof1976andtherigh
t
tostoreandretrieveonecopyofthework,youmaynotdecompile,
disassemble,reverseengineer,reproduce,modify,createderivative
works
basedupon,transmit,distribute,disseminate,sell,publishorsublicen
sethe
workoranypartofitwithoutMcGraw-HillEducation’spriorconsent.
Youmayusetheworkforyourownnoncommercialandpersonaluse;a
ny
otheruseoftheworkisstrictlyprohibited.Yourrighttousetheworkma
y
beterminatedifyoufailtocomplywiththeseterms.
THEWORKISPROVIDED“ASIS.”McGRAW-HILLEDUCATION
ANDITSLICENSORSMAKENOGUARANTEESORWARRANTI
ES
ASTOTHEACCURACY,ADEQUACYORCOMPLETENESSOFO
R
RESULTSTOBEOBTAINEDFROMUSINGTHEWORK,
INCLUDINGANYINFORMATIONTHATCANBEACCESSED
THROUGHTHEWORKVIAHYPERLINKOROTHERWISE,AND
EXPRESSLYDISCLAIMANYWARRANTY,EXPRESSORIMPLI
ED,
INCLUDINGBUTNOTLIMITEDTOIMPLIEDWARRANTIESOF
MERCHANTABILITYORFITNESSFORAPARTICULARPURPO
SE.
McGraw-
HillEducationanditslicensorsdonotwarrantorguaranteethat
thefunctionscontainedintheworkwillmeetyourrequirementsorthat
its
operationwillbeuninterruptedorerrorfree.NeitherMcGraw-Hill
Educationnoritslicensorsshallbeliabletoyouoranyoneelseforany
inaccuracy,errororomission,regardlessofcause,intheworkorforan
y
damagesresultingtherefrom.McGraw-HillEducationhasno
responsibilityforthecontentofanyinformationaccessedthroughthe
work.UndernocircumstancesshallMcGraw-
HillEducationand/orits
licensorsbeliableforanyindirect,incidental,special,punitive,
consequentialorsimilardamagesthatresultfromtheuseoforinability
to
usethework,evenifanyofthemhasbeenadvisedofthepossibilityof
suchdamages.Thislimitationofliabilityshallapplytoanyclaimorca
use
whatsoeverwhethersuchclaimorcausearisesincontract,tortor
otherwise.
AbouttheAuthors
Dr.Wm.ArthurConklinisanassociateprofessorandDirectorofthe
CenterforInformationSecurityResearchandEducationintheColleg
eof
TechnologyattheUniversityofHouston.Heholdstwoterminaldegre
es,a
Ph.D.inBusinessAdministration(specializinginInformationSecuri
ty)
fromTheUniversityofTexasatSanAntonio(UTSA)andthedegree
ElectricalEngineer(specializinginSpaceSystemsEngineering)fro
mthe
NavalPostgraduateSchoolinMonterey,CA.HeholdsCompTIA
Security+,CISSP,CSSLP,CRISC,DFCP,GICSP,andCASP
certifications.AnISSAFellow,heisalsoaseniormemberofASQanda
memberofIEEEandACM.Hisresearchinterestsincludetheuseof
systemstheorytoexploreinformationsecurity,specificallyincyber-
physicalsystems.Hehascoauthoredsixsecuritybooksandnumerous
academicarticlesassociatedwithinformationsecurity.Heisactivein
the
DHS-sponsoredIndustrialControlSystemsJointWorkingGroup
(ICSJWG)effortsassociatedwithworkforcedevelopmentand
cybersecurityaspectsofindustrialcontrolsystems.Hehasanextensiv
e
backgroundinsecurecodingandisaformerco-chairoftheDHS/DoD
SoftwareAssuranceForumworkinggroupforworkforceeducation,
training,anddevelopment.
Dr.GregoryWhitehasbeeninvolvedincomputerandnetworksecurit
y
since1986.Hespent19yearsonactivedutywiththeU.S.AirForceandi
s
currentlyintheAirForceReservesassignedtothePentagon.Heobtain
ed
hisPh.D.inComputerSciencefromTexasA&MUniversityin1995.Hi
s
dissertationtopicwasintheareaofcomputernetworkintrusiondetecti
on,
andhecontinuestoconductresearchinthisareatoday.Heiscurrentlyt
he
DirectorfortheCenterforInfrastructureAssuranceandSecurityandi
san
associateprofessorofcomputerscienceatTheUniversityofTexasatS
an
Antonio.Dr.Whitehaswrittenandpresentednumerousarticlesand
conferencepapersonsecurity.Heisalsothecoauthorforfivetextbook
s
oncomputerandnetworksecurityandhaswrittenchaptersfortwoothe
r
securitybooks.Dr.Whitecontinuestobeactiveinsecurityresearch.H
is
currentresearchinitiativesincludeeffortsinhigh-speedintrusion
detection,communityinfrastructureprotection,andvisualizationof
communityandorganizationsecuritypostures.
DwayneWilliamsisAssociateDirector,SpecialProjectsfortheCente
r
forInfrastructureAssuranceandSecurity(CIAS)attheUniversityof
TexasatSanAntonioandhasmorethan22yearsofexperiencein
informationsystemsandnetworksecurity.Mr.Williams’sexperienc
e
includessixyearsofcommissionedmilitaryserviceasaCommunicati
ons-
ComputerInformationSystemsOfficerintheU.S.AirForce,speciali
zing
innetworksecurity,corporateinformationprotection,intrusiondete
ction
systems,incidentresponse,andVPNtechnology.Priortojoiningthe
CIAS,heservedasDirectorofConsultingforSecureLogixCorporatio
n,
wherehedirectedandprovidedsecurityassessmentandintegration
servicestoFortune100,government,publicutility,oilandgas,financi
al,
andtechnologyclients.Mr.Williamsgraduatedin1993fromBaylor
UniversitywithaBachelorofArtsinComputerScience.Mr.Williams
isa
CertifiedInformationSystemsSecurityProfessional(CISSP),Comp
TIA
AdvancedSecurityPractitioner(CASP),andcoauthorofMcGraw-
Hill’s
VoiceandDataSecurity,CompTIASecurity+All-in-
OneExamGuide,and
CASPCompTIAAdvancedSecurityPractitionerCertificationStudy
Guide.
RogerL.Davis,CISSP,CISM,CISA,isanAccountManagerfor
Microsoft.HehasservedaspresidentoftheUtahchapterofthe
InformationSystemsSecurityAssociation(ISSA)andvariousboard
positionsfortheUtahchapteroftheInformationSystemsAuditand
ControlAssociation(ISACA).HeisaretiredAirForcelieutenantcolo
nel
with35yearsofmilitaryandinformationsystems/securityexperience
.Mr.
DavisservedonthefacultyofBrighamYoungUniversityandtheAir
ForceInstituteofTechnology.HecoauthoredMcGraw-
Hill’sCompTIA
Security+All-in-
OneExamGuideandVoiceandDataSecurity.Heholds
aMaster’sdegreeinComputerSciencefromGeorgeWashington
University,aBachelor’sdegreeinComputerSciencefromBrigham
YoungUniversity,andperformedpost-graduatestudiesinelectrical
engineeringandcomputerscienceattheUniversityofColorado.
ChuckCothren,CISSP,isaPrincipal
Solution
sSpecialistatSymantec
Corporationapplyingawidearrayofnetworksecurityexperience,
includingperformingcontrolledpenetrationtesting,incidentrespon
se,and
securitymanagementtoassistawidevarietyofclientsintheprotection
of
theircriticaldata.HehasalsoanalyzedsecuritymethodologiesforVoi
ce
overInternetProtocol(VoIP)systemsandsupervisorycontrolanddat
a
acquisition(SCADA)systems.HeiscoauthorofthebooksVoiceand
DataSecurity,andCompTIASecurity+All-in-OneExamGuide.
AbouttheTechnicalEditor
BobbyE.RogersisanInformationSecurityEngineerworkingasa
contractorforDepartmentofDefenseagencies,helpingtosecure,cert
ify,
andaccredittheirinformationsystems.Hisdutiesincludeinformatio
n
systemsecurityengineering,riskmanagement,andcertificationand
accreditationefforts.Heretiredafter21yearsintheUnitedStatesAir
Force,servingasanetworksecurityengineerandinstructor,andhas
securednetworksallovertheworld.BobbyhasaMaster’sdegreein
InformationAssurance(IA),andispursuingadoctoraldegreein
CybersecurityfromCapitolTechnologyUniversity,Maryland.Hism
any
certificationsincludeCRISC,CISSP-
ISSEP,C|EH,andMCSE:Security
aswellastheCompTIAA+,Network+,Security+,andMobility+
certifications.
Acknowledgments
Thisbookisdedicatedtothemanysecurityprofessionalswhodaily
worktoensurethesafetyofournation’scriticalinfrastructures.Wewa
nt
torecognizethethousandsofdedicatedindividualswhostrivetoprote
ct
ournationalassetsbutwhoseldomreceivepraiseandoftenareonly
noticedwhenanincidentoccurs.Toyou,wesaythankyouforajobwell
done!
We,theauthorsofPrinciplesofComputerSecurity,FourthEdition,ha
ve
manyindividualswhoweneedtoacknowledge—individualswithout
whomthiseffortwouldnothavebeensuccessful.Thiseditionwouldno
t
havebeenpossiblewithoutTimGreen,whosesupportandfaithinthe
authorsmadethiseditionpossible.Hebroughttogetheranall-star
productionteamthatmadethisbookmorethanjustanewedition,buta
completelearningsystem.
ThelistneedstostartwiththosefolksatMcGraw-HillEducationwho
workedtirelesslywiththeproject’smultipleauthorsandcontributors
and
ledussuccessfullythroughtheminefieldthatisabookscheduleandwh
o
tookourroughchaptersanddrawingsandturnedthemintoafinal,
professionalproductwecanbeproudof.Wethankallthegoodpeople
fromtheAcquisitionsteam,TimGreenandAmyStonebraker;fromthe
EditorialServicesteam,JodyMcKenzieandHowieSeverson;fromth
e
IllustrationandProductionteams,JamesKussowandAmarjeetKuma
rand
thecompositionteamatCenveoPublisherServices.Wealsothankthe
technicaleditor,BobbyRogers;thecopyeditor,BillMcManus;the
proofreader,PaulTyler;andtheindexer,JackLewis;foralltheirattent
ion
todetailthatmadethisafinerworkaftertheyfinishedwithit.
Wealsoneedtoacknowledgeourcurrentemployerswho,toourgreat
delight,haveseenfittopayustoworkinacareerfieldthatweallfind
excitingandrewarding.Thereisneveradullmomentinsecurity,becau
se
itisconstantlychanging.
WewouldliketothankArtConklinforherdingthecatsonthisone.
Finally,wewouldeachliketoindividuallythankthosepeoplewho—
on
apersonalbasis—haveprovidedthecoresupportforusindividually.
Withoutthesespecialpeopleinourlives,noneofuscouldhaveputthis
worktogether.
—TheAuthorTeam
ToSusan,yourloveandsupportiswhatenablesmetodoallthethingsI
do.
—ArtConklin,Ph.D.
Iwouldliketothankmywife,Charlan,forthetremendoussupportsheh
as
alwaysgivenme.Itdoesn’tmatterhowmanytimesIhaveswornthatI’ll
nevergetinvolvedwithanotherbookprojectonlytoreturnwithinmont
hs
toyetanotherone;throughitall,shehasremainedsupportive.
IwouldalsoliketopubliclythanktheUnitedStatesAirForce,which
providedmenumerousopportunitiessince1986tolearnmoreabout
securitythanIeverknewexisted.
Towhoeveritwaswhodecidedtosendmeasayoungcaptain—fresh
fromcompletingmymaster’sdegreeinartificialintelligence—
tomyfirst
assignmentincomputersecurity:thankyou,ithasbeenagreatadventu
re!
—GregoryB.White,Ph.D.
Josie,thankyouforalltheloveandsupport.Macon,John,thisisforyou
.
—ChuckCothren
Geena,thanksforbeingmybestfriendandmygreatestsupport.Anythi
ng
Iamisbecauseofyou.Lovetomykidsandgrandkids!
—RogerL.Davis
Tomywifeandbestfriend,Leah,foryourlove,energy,andsupport—
thankyouforalwaysbeingthere.Here’stomanymoreyearstogether.
—DwayneWilliams
ABOUTTHISBOOK
ImportantTechnologySkills
Informationtechnology(IT)offersmanycareerpaths,andinformatio
n
securityisoneofthefastest-
growingtracksforITprofessionals.Thisbook
providescoverageofthematerialsyouneedtobeginyourexplorationo
f
informationsecurity.InadditiontocoveringalloftheCompTIASecur
ity+
examobjectives,additionalmaterialisincludedtohelpyoubuildasoli
d
introductoryknowledgeofinformationsecurity.
ProvenLearningMethodKeepsYouonTrack
Designedforclassroomuseandwrittenbyinstructorsforuseintheir
ownclasses,PrinciplesofComputerSecurityisstructuredtogiveyou
comprehensiveknowledgeofinformationsecurity.Thetextbook’s
activelearningmethodologyguidesyoubeyondmererecalland—
throughthought-provokingactivities,labs,andsidebars—helpsyou
developcritical-thinking,diagnostic,andcommunicationskills.
EffectiveLearningTools
Thisfeature-
richtextbookisdesignedtomakelearningeasyandenjoyable
andtohelpyoudeveloptheskillsandcritical-
thinkingabilitiesthatwill
enableyoutoadapttodifferentjobsituationsandtotroubleshoot
problems.Writtenbyinstructorswithdecadesofcombinedinformati
on
securityexperience,thisbookconveyseventhemostcomplexissuesi
nan
accessible,easy-tounderstandformat.
Eachchapterincludes
LearningObjectivesthatsetmeasurablegoalsforchapter-by-
chapterprogress
Illustrationsthatgiveyouaclearpictureoftheconceptsand
technologies
TryThis!,CrossCheck,andTechTipsidebarsthatencourage
youtopracticeandapplyconceptsinreal-worldsettings
Notes,Tips,andWarningsthatguideyou,andExamTipsthat
giveyouadviceorprovideinformationspecificallyrelatedto
preparingfortheexam
ChapterSummariesandKeyTermsListsthatprovideyouwith
aneasywaytoreviewimportantconceptsandvocabulary
ChallengingEnd-of-ChapterTeststhatincludevocabulary-
buildingexercises,multiple-choicequestions,essayquestions,and
on-the-joblabprojects
CompTIAAPPROVEDQUALITYCONTENT
ItPaystoGetCertified
Inadigitalworld,digitalliteracyisanessentialsurvivalskill.Certific
ation
demonstratesthatyouhavetheknowledgeandskilltosolvetechnicalo
r
businessproblemsinvirtuallyanybusinessenvironment.CompTIA
certificationsarehighlyvaluedcredentialsthatqualifyyouforjobs,
increasedcompensation,andpromotion.
CompTIASecurity+CertificationHelpsYour
Career
Securityisoneofthehighestdemandjobcategories,growingin
importanceasthefrequencyandseverityofsecuritythreatscontinues
tobeamajorconcernfororganizationsaroundtheworld.
Jobsforsecurityadministratorsareexpectedtoincreaseby18%
—theskillsetrequiredforthesetypesofjobsmapstotheCompTIA
Security+certification.
NetworkSecurityAdministratorscanearnasmuchas$106,000per
year.
CompTIASecurity+isthefirststepinstartingyourcareerasa
NetworkSecurityAdministratororSystemsSecurityAdministrator.
Morethan250,000individualsworldwideareCompTIASecurity+
certified.
CompTIASecurity+isregularlyusedinorganizationssuchas
HitachiSystems,FujiXerox,HP,Dell,andavarietyofmajorU.S.
governmentcontractors.
ApprovedbytheU.S.DepartmentofDefense(DoD)asoneofthe
requiredcertificationoptionsintheDoD8570.01-Mdirective,for
InformationAssuranceTechnicalLevelIIandManagementLevelI
jobroles.
StepstoGettingCertifiedandStayingCertified
1.Reviewtheexamobjectives.Reviewthecertificationobjectivesto
makesureyouknowwhatiscoveredintheexam:
http://certification.comptia.org/examobjectives.aspx
2.Practicefortheexam.Afteryouhavestudiedforthecertification
exam,reviewandanswersamplequestionstogetanideaofwhattype
ofquestionsmightbeontheexam:
http://certification.comptia.org/samplequestions.aspx
3.Purchaseanexamvoucher.Youcanpurchaseexamvouchersonthe
CompTIAMarketplace,www.comptiastore.com.
4.Takethetest!GotothePearsonVUEwebsite,
www.pearsonvue.com/comptia/,andscheduleatimetotakeyour
exam.
5.Staycertified!EffectiveJanuary1,2011,newCompTIASecurity+
certificationsarevalidforthreeyearsfromthedateofcertification.
Thereareanumberofwaysthecertificationcanberenewed.Formore
informationgotohttp://certification.comptia.org/ce.
ForMoreInformation
VisitCompTIAonlineGoto
http://certification.comptia.org/home.aspxtolearnmoreaboutgetti
ng
CompTIAcertified.
ContactCompTIAPleasecall866-835-8020andchooseOption2,
ore-mail[email protected]
ConnectwithCompTIAFindCompTIAonFacebook,LinkedIn,
Twitter,andYouTube.
http://certification.comptia.org/examobjectives.aspx
http://certification.comptia.org/samplequestions.aspx
http://www.comptiastore.com
http://www.pearsonvue.com/comptia/
http://certification.comptia.org/ce
http://certification.comptia.org/home.aspx
mailto:[email protected]
ContentSealofQuality
ThiscoursewarebearsthesealofCompTIAApprovedQualityConten
t.
Thissealsignifiesthiscontentcovers100percentoftheexamobjectiv
es
andimplementsimportantinstructionaldesignprinciples.CompTIA
recommendsmultiplelearningtoolstohelpincreasecoverageofthe
learningobjectives.
CAQCDisclaimer
ThelogooftheCompTIAApprovedQualityContent(CAQC)progra
m
andthestatusofthisorothertrainingmaterialas“Approved”underthe
CompTIAApprovedQualityContentprogramsignifiesthat,in
CompTIA’sopinion,suchtrainingmaterialcoversthecontentof
CompTIA’srelatedcertificationexam.
ThecontentsofthistrainingmaterialwerecreatedfortheCompTIA
Security+examcoveringCompTIAcertificationobjectivesthatwere
currentasofthedateofpublication.
CompTIAhasnotreviewedorapprovedtheaccuracyofthecontentsof
thistrainingmaterialandspecificallydisclaimsanywarrantiesof
merchantabilityorfitnessforaparticularpurpose.CompTIAmakesn
o
guaranteeconcerningthesuccessofpersonsusinganysuch“Approve
d”or
othertrainingmaterialinordertoprepareforanyCompTIAcertificati
on
exam.
CONTENTSATAGLANCE
Chapter1 IntroductionandSecurityTrends
Chapter2 GeneralSecurityConcepts
Chapter3 OperationalandOrganizationalSecurity
Chapter4 TheRoleofPeopleinSecurity
Chapter5 Cryptography
Chapter6 PublicKeyInfrastructure
Chapter7 PKIStandardsandProtocols
Chapter8 PhysicalSecurity
Chapter9 NetworkFundamentals
Chapter10 InfrastructureSecurity
Chapter11 AuthenticationandRemoteAccess
Chapter12 WirelessSecurityandMobileDevices
Chapter13 IntrusionDetectionSystemsandNetworkSecurity
Chapter14 SystemHardeningandBaselines
Chapter15 TypesofAttacksandMaliciousSoftware
Chapter16 E-MailandInstantMessaging
Chapter17 WebComponents
Chapter18 SecureSoftwareDevelopment
Chapter19 BusinessContinuityandDisasterRecovery,and
OrganizationalPolicies
Chapter20 RiskManagement
Chapter21 ChangeManagement
Chapter22 IncidentResponse
Chapter23 ComputerForensics
Chapter24 LegalIssuesandEthics
Chapter25 Privacy
AppendixA CompTIASecurity+ExamObjectives:SY0-401
AppendixB AbouttheDownload
Glossary
Index
CONTENTS
Foreword
Preface
Introduction
InstructorWebSite
Chapter1
IntroductionandSecurityTrends
TheComputerSecurityProblem
DefinitionofComputerSecurity
HistoricalSecurityIncidents
TheCurrentThreatEnvironment
ThreatstoSecurity
SecurityTrends
TargetsandAttacks
SpecificTarget
OpportunisticTarget
MinimizingPossibleAvenuesofAttack
ApproachestoComputerSecurity
Ethics
AdditionalReferences
Chapter1Review
Chapter2
GeneralSecurityConcepts
BasicSecurityTerminology
SecurityBasics
SecurityTenets
SecurityApproaches
SecurityPrinciples
AccessControl
AuthenticationMechanisms
AuthenticationandAccessControlPolicies
SecurityModels
ConfidentialityModels
IntegrityModels
Chapter2Review
Chapter3
OperationalandOrganizationalSecurity
Policies,Procedures,Standards,andGuidelines
SecurityPolicies
ChangeManagementPolicy
DataPolicies
HumanResourcesPolicies
DueCareandDueDiligence
DueProcess
IncidentResponsePoliciesandProcedures
SecurityAwarenessandTraining
SecurityPolicyTrainingandProcedures
Role-BasedTraining
CompliancewithLaws,BestPractices,andStandards
UserHabits
NewThreatsandSecurityTrends/Alerts
TrainingMetricsandCompliance
InteroperabilityAgreements
ServiceLevelAgreements
BusinessPartnershipAgreement
MemorandumofUnderstanding
InterconnectionSecurityAgreement
TheSecurityPerimeter
PhysicalSecurity
PhysicalAccessControls
PhysicalBarriers
EnvironmentalIssues
FireSuppression
Wireless
ElectromagneticEavesdropping
ModernEavesdropping
Chapter3Review
Chapter4
TheRoleofPeopleinSecurity
People—ASecurityProblem
SocialEngineering
PoorSecurityPractices
PeopleasaSecurityTool
SecurityAwareness
SecurityPolicyTrainingandProcedures
Chapter4Review
Chapter5
Cryptography
CryptographyinPractice
FundamentalMethods
ComparativeStrengthsandPerformanceofAlgorithms
HistoricalPerspectives
SubstitutionCiphers
One-TimePads
Algorithms
KeyManagement
RandomNumbers
HashingFunctions
SHA
RIPEMD
MessageDigest
HashingSummary
SymmetricEncryption
DES
3DES
AES
CAST
RC
Blowfish
Twofish
IDEA
Blockvs.Stream
SymmetricEncryptionSummary
AsymmetricEncryption
Diffie-Hellman
RSA
ElGamal
ECC
AsymmetricEncryptionSummary
Symmetricvs.Asymmetric
QuantumCryptography
Steganography
CryptographyAlgorithmUse
Confidentiality
Integrity
Authentication
Nonrepudiation
CipherSuites
KeyExchange
KeyEscrow
SessionKeys
EphemeralKeys
KeyStretching
SecrecyPrinciples
TransportEncryption
DigitalSignatures
DigitalRightsManagement
CryptographicApplications
UseofProvenTechnologies
Chapter5Review
Chapter6
PublicKeyInfrastructure
TheBasicsofPublicKeyInfrastructures
CertificateAuthorities
RegistrationAuthorities
LocalRegistrationAuthorities
DigitalCertificates
CertificateExtensions
CertificateAttributes
CertificateLifecycles
RegistrationandGeneration
CSR
Renewal
Suspension
Revocation
KeyDestruction
CertificateRepositories
TrustandCertificateVerification
CentralizedandDecentralizedInfrastructures
HardwareSecurityModules
PrivateKeyProtection
KeyRecovery
KeyEscrow
PublicCertificateAuthorities
In-HouseCertificateAuthorities
ChoosingBetweenaPublicCAandanIn-HouseCA
OutsourcedCertificateAuthorities
TyingDifferentPKIsTogether
TrustModels
Certificate-BasedThreats
StolenCertificates
Chapter6Review
Chapter7
PKIStandardsandProtocols
PKIXandPKCS
PKIXStandards
PKCS
WhyYouNeedtoKnowthePKIXandPKCSStandards
X.509
SSL/TLS
CipherSuites
ISAKMP
CMP
XKMS
S/MIME
IETFS/MIMEHistory
IETFS/MIMEv3Specifications
PGP
HowPGPWorks
HTTPS
IPsec
CEP
OtherStandards
FIPS
CommonCriteria
WTLS
ISO/IEC27002(FormerlyISO17799)
SAML
Chapter7Review
Chapter8
PhysicalSecurity
TheSecurityProblem
PhysicalSecuritySafeguards
WallsandGuards
PhysicalAccessControlsandMonitoring
Convergence
PoliciesandProcedures
EnvironmentalControls
FireSuppression
Water-BasedFireSuppressionSystems
Halon-BasedFireSuppressionSystems
Clean-AgentFireSuppressionSystems
HandheldFireExtinguishers
FireDetectionDevices
PowerProtection
UPS
BackupPowerandCableShielding
ElectromagneticInterference
ElectronicAccessControlSystems
AccessTokens
Chapter8Review
Chapter9
NetworkFundamentals
NetworkArchitectures
NetworkTopology
NetworkProtocols
Protocols
Packets
InternetProtocol
IPPackets
TCPvs.UDP
ICMP
IPv4vs.IPv6
PacketDelivery
Ethernet
LocalPacketDelivery
RemotePacketDelivery
IPAddressesandSubnetting
NetworkAddressTranslation
SecurityZones
DMZ
Internet
Intranet
Extranet
FlatNetworks
Enclaves
VLANs
ZonesandConduits
Tunneling
StorageAreaNetworks
iSCSI
FibreChannel
FCoE
Chapter9Review
Chapter10
InfrastructureSecurity
Devices
Workstations
Servers
Virtualization
MobileDevices
DeviceSecurity,CommonConcerns
NetworkAttachedStorage
RemovableStorage
Networking
NetworkInterfaceCards
Hubs
Bridges
Switches
Routers
Firewalls
HowDoFirewallsWork?
Next-GenerationFirewalls
WebApplicationFirewallsvs.NetworkFirewalls
Concentrators
WirelessDevices
Modems
Telephony
VPNConcentrator
SecurityDevices
IntrusionDetectionSystems
NetworkAccessControl
NetworkMonitoring/Diagnostic
LoadBalancers
Proxies
WebSecurityGateways
InternetContentFilters
DataLossPrevention
UnifiedThreatManagement
Media
CoaxialCable
UTP/STP
Fiber
UnguidedMedia
RemovableMedia
MagneticMedia
OpticalMedia
ElectronicMedia
SecurityConcernsforTransmissionMedia
PhysicalSecurityConcerns
CloudComputing
Private
Public
Hybrid
Community
SoftwareasaService
PlatformasaService
InfrastructureasaService
Chapter10Review
Chapter11
AuthenticationandRemoteAccess
User,Group,andRoleManagement
User
Group
Role
PasswordPolicies
DomainPasswordPolicy
SingleSign-On
TimeofDayRestrictions
Tokens
AccountandPasswordExpiration
SecurityControlsandPermissions
AccessControlLists
MandatoryAccessControl(MAC)
DiscretionaryAccessControl(DAC)
Role-BasedAccessControl(RBAC)
Rule-BasedAccessControl
AttributeBasedAccessControl(ABAC)
AccountExpiration
PreventingDataLossorTheft
TheRemoteAccessProcess
Identification
Authentication
Authorization
AccessControl
RemoteAccessMethods
IEEE802.1X
RADIUS
TACACS+
AuthenticationProtocols
FTP/FTPS/SFTP
VPNs
IPsec
VulnerabilitiesofRemoteAccessMethods
ConnectionSummary
Chapter11Review
Chapter12
WirelessSecurityandMobileDevices
IntroductiontoWirelessNetworking
MobilePhones
WirelessApplicationProtocol
3GMobileNetworks
4GMobileNetworks
Bluetooth
BluetoothAttacks
NearFieldCommunication
IEEE802.11Series
802.11:IndividualStandards
Attacking802.11
CurrentSecurityMethods
WirelessSystemsConfiguration
AntennaTypes
AntennaPlacement
PowerLevelControls
SiteSurveys
CaptivePortals
SecuringPublicWi-Fi
MobileDevices
MobileDeviceSecurity
BYODConcerns
LocationServices
MobileApplicationSecurity
Chapter12Review
Chapter13
IntrusionDetectionSystemsandNetworkSecurity
HistoryofIntrusionDetectionSystems
IDSOverview
IDSModels
Signatures
FalsePositivesandFalseNegatives
Network-BasedIDSs
AdvantagesofaNIDS
DisadvantagesofaNIDS
Activevs.PassiveNIDSs
NIDSTools
Host-BasedIDSs
AdvantagesofHIDSs
DisadvantagesofHIDSs
Activevs.PassiveHIDSs
ResurgenceandAdvancementofHIDSs
IntrusionPreventionSystems
HoneypotsandHoneynets
Tools
ProtocolAnalyzer
SwitchedPortAnalyzer
PortScanner
Passivevs.ActiveTools
BannerGrabbing
Chapter13Review
Chapter14
SystemHardeningandBaselines
OverviewofBaselines
OperatingSystemandNetworkOperatingSystemHardening
OSSecurity
HostSecurity
MachineHardening
OperatingSystemSecurityandSettings
OSHardening
HardeningMicrosoftOperatingSystems
HardeningUNIX-orLinux-BasedOperatingSystems
Updates(a.k.a.Hotfixes,ServicePacks,andPatches)
Antimalware
WhiteListingvs.BlackListingApplications
TrustedOS
Host-basedFirewalls
HardwareSecurity
HostSoftwareBaselining
Host-BasedSecurityControls
Hardware-BasedEncryptionDevices
DataEncryption
DataSecurity
HandlingBigData
CloudStorage
StorageAreaNetwork
Permissions/ACL
NetworkHardening
…
Copyright©2016byMcGraw-HillEducation.Allrights.docx

More Related Content

More from voversbyobersby

Cost and benefit analysisWe are doing group presentation.docx
Cost and benefit analysisWe are doing group presentation.docxCost and benefit analysisWe are doing group presentation.docx
Cost and benefit analysisWe are doing group presentation.docx
voversbyobersby
 
Cosmetics as endocrine disruptors are they a health risk.docx
Cosmetics as endocrine disruptors are they a health risk.docxCosmetics as endocrine disruptors are they a health risk.docx
Cosmetics as endocrine disruptors are they a health risk.docx
voversbyobersby
 
COSC2737 Assignment 2 IT Infrastructure in the Cloud. .docx
COSC2737 Assignment 2  IT Infrastructure in the Cloud.  .docxCOSC2737 Assignment 2  IT Infrastructure in the Cloud.  .docx
COSC2737 Assignment 2 IT Infrastructure in the Cloud. .docx
voversbyobersby
 
Cortes and the Aztecs Respond in writing to the following questi.docx
Cortes and the Aztecs Respond in writing to the following questi.docxCortes and the Aztecs Respond in writing to the following questi.docx
Cortes and the Aztecs Respond in writing to the following questi.docx
voversbyobersby
 
Correlation and RegressionForecasting is a critical job for mana.docx
Correlation and RegressionForecasting is a critical job for mana.docxCorrelation and RegressionForecasting is a critical job for mana.docx
Correlation and RegressionForecasting is a critical job for mana.docx
voversbyobersby
 
Correlation and Regression StudyBackground During this week .docx
Correlation and Regression StudyBackground During this week .docxCorrelation and Regression StudyBackground During this week .docx
Correlation and Regression StudyBackground During this week .docx
voversbyobersby
 
Correlate your job responsibilities with the Disaster recovery c.docx
Correlate your job responsibilities with the Disaster recovery c.docxCorrelate your job responsibilities with the Disaster recovery c.docx
Correlate your job responsibilities with the Disaster recovery c.docx
voversbyobersby
 
Correctional CounselingRobert HanserScott Mire20111 The .docx
Correctional CounselingRobert HanserScott Mire20111 The .docxCorrectional CounselingRobert HanserScott Mire20111 The .docx
Correctional CounselingRobert HanserScott Mire20111 The .docx
voversbyobersby
 
Correlate health and safety issues at workplace with ideals. Y.docx
Correlate health and safety issues at workplace with ideals. Y.docxCorrelate health and safety issues at workplace with ideals. Y.docx
Correlate health and safety issues at workplace with ideals. Y.docx
voversbyobersby
 
Correctional Program ShowcaseSubmitted BY Intensive moti.docx
Correctional Program ShowcaseSubmitted BY Intensive moti.docxCorrectional Program ShowcaseSubmitted BY Intensive moti.docx
Correctional Program ShowcaseSubmitted BY Intensive moti.docx
voversbyobersby
 
Corrections in America - please type the answers separateDiscu.docx
Corrections in America - please type the answers separateDiscu.docxCorrections in America - please type the answers separateDiscu.docx
Corrections in America - please type the answers separateDiscu.docx
voversbyobersby
 
Correction to be made for my code of ethical plan Inclusion of.docx
Correction to be made for my code of ethical plan Inclusion of.docxCorrection to be made for my code of ethical plan Inclusion of.docx
Correction to be made for my code of ethical plan Inclusion of.docx
voversbyobersby
 
Correct the following paragraph. Insert or delete hyphens as nee.docx
Correct the following paragraph. Insert or delete hyphens as nee.docxCorrect the following paragraph. Insert or delete hyphens as nee.docx
Correct the following paragraph. Insert or delete hyphens as nee.docx
voversbyobersby
 
Correctional AdministratorsPrisons and jails are both clas.docx
Correctional AdministratorsPrisons and jails are both clas.docxCorrectional AdministratorsPrisons and jails are both clas.docx
Correctional AdministratorsPrisons and jails are both clas.docx
voversbyobersby
 
Corporations are making the assumption that everyone uses a sm.docx
Corporations are making the assumption that everyone uses a sm.docxCorporations are making the assumption that everyone uses a sm.docx
Corporations are making the assumption that everyone uses a sm.docx
voversbyobersby
 
Corporation M, a calendar year corporation that began doing business.docx
Corporation M, a calendar year corporation that began doing business.docxCorporation M, a calendar year corporation that began doing business.docx
Corporation M, a calendar year corporation that began doing business.docx
voversbyobersby
 
Corporate Valuation and Stock ValuationCHAPTER 7© 2020 Cenga.docx
Corporate Valuation and Stock ValuationCHAPTER 7© 2020 Cenga.docxCorporate Valuation and Stock ValuationCHAPTER 7© 2020 Cenga.docx
Corporate Valuation and Stock ValuationCHAPTER 7© 2020 Cenga.docx
voversbyobersby
 
CORPORATE TRAINING .docx
CORPORATE TRAINING                                            .docxCORPORATE TRAINING                                            .docx
CORPORATE TRAINING .docx
voversbyobersby
 
Corporate TAX homework problems. Need help with solving. email is .docx
Corporate TAX homework problems. Need help with solving. email is .docxCorporate TAX homework problems. Need help with solving. email is .docx
Corporate TAX homework problems. Need help with solving. email is .docx
voversbyobersby
 
Corporate Valuation and Financial PlanningCHAPTER 12© 2020 C.docx
Corporate Valuation and Financial PlanningCHAPTER 12© 2020 C.docxCorporate Valuation and Financial PlanningCHAPTER 12© 2020 C.docx
Corporate Valuation and Financial PlanningCHAPTER 12© 2020 C.docx
voversbyobersby
 

More from voversbyobersby (20)

Cost and benefit analysisWe are doing group presentation.docx
Cost and benefit analysisWe are doing group presentation.docxCost and benefit analysisWe are doing group presentation.docx
Cost and benefit analysisWe are doing group presentation.docx
 
Cosmetics as endocrine disruptors are they a health risk.docx
Cosmetics as endocrine disruptors are they a health risk.docxCosmetics as endocrine disruptors are they a health risk.docx
Cosmetics as endocrine disruptors are they a health risk.docx
 
COSC2737 Assignment 2 IT Infrastructure in the Cloud. .docx
COSC2737 Assignment 2  IT Infrastructure in the Cloud.  .docxCOSC2737 Assignment 2  IT Infrastructure in the Cloud.  .docx
COSC2737 Assignment 2 IT Infrastructure in the Cloud. .docx
 
Cortes and the Aztecs Respond in writing to the following questi.docx
Cortes and the Aztecs Respond in writing to the following questi.docxCortes and the Aztecs Respond in writing to the following questi.docx
Cortes and the Aztecs Respond in writing to the following questi.docx
 
Correlation and RegressionForecasting is a critical job for mana.docx
Correlation and RegressionForecasting is a critical job for mana.docxCorrelation and RegressionForecasting is a critical job for mana.docx
Correlation and RegressionForecasting is a critical job for mana.docx
 
Correlation and Regression StudyBackground During this week .docx
Correlation and Regression StudyBackground During this week .docxCorrelation and Regression StudyBackground During this week .docx
Correlation and Regression StudyBackground During this week .docx
 
Correlate your job responsibilities with the Disaster recovery c.docx
Correlate your job responsibilities with the Disaster recovery c.docxCorrelate your job responsibilities with the Disaster recovery c.docx
Correlate your job responsibilities with the Disaster recovery c.docx
 
Correctional CounselingRobert HanserScott Mire20111 The .docx
Correctional CounselingRobert HanserScott Mire20111 The .docxCorrectional CounselingRobert HanserScott Mire20111 The .docx
Correctional CounselingRobert HanserScott Mire20111 The .docx
 
Correlate health and safety issues at workplace with ideals. Y.docx
Correlate health and safety issues at workplace with ideals. Y.docxCorrelate health and safety issues at workplace with ideals. Y.docx
Correlate health and safety issues at workplace with ideals. Y.docx
 
Correctional Program ShowcaseSubmitted BY Intensive moti.docx
Correctional Program ShowcaseSubmitted BY Intensive moti.docxCorrectional Program ShowcaseSubmitted BY Intensive moti.docx
Correctional Program ShowcaseSubmitted BY Intensive moti.docx
 
Corrections in America - please type the answers separateDiscu.docx
Corrections in America - please type the answers separateDiscu.docxCorrections in America - please type the answers separateDiscu.docx
Corrections in America - please type the answers separateDiscu.docx
 
Correction to be made for my code of ethical plan Inclusion of.docx
Correction to be made for my code of ethical plan Inclusion of.docxCorrection to be made for my code of ethical plan Inclusion of.docx
Correction to be made for my code of ethical plan Inclusion of.docx
 
Correct the following paragraph. Insert or delete hyphens as nee.docx
Correct the following paragraph. Insert or delete hyphens as nee.docxCorrect the following paragraph. Insert or delete hyphens as nee.docx
Correct the following paragraph. Insert or delete hyphens as nee.docx
 
Correctional AdministratorsPrisons and jails are both clas.docx
Correctional AdministratorsPrisons and jails are both clas.docxCorrectional AdministratorsPrisons and jails are both clas.docx
Correctional AdministratorsPrisons and jails are both clas.docx
 
Corporations are making the assumption that everyone uses a sm.docx
Corporations are making the assumption that everyone uses a sm.docxCorporations are making the assumption that everyone uses a sm.docx
Corporations are making the assumption that everyone uses a sm.docx
 
Corporation M, a calendar year corporation that began doing business.docx
Corporation M, a calendar year corporation that began doing business.docxCorporation M, a calendar year corporation that began doing business.docx
Corporation M, a calendar year corporation that began doing business.docx
 
Corporate Valuation and Stock ValuationCHAPTER 7© 2020 Cenga.docx
Corporate Valuation and Stock ValuationCHAPTER 7© 2020 Cenga.docxCorporate Valuation and Stock ValuationCHAPTER 7© 2020 Cenga.docx
Corporate Valuation and Stock ValuationCHAPTER 7© 2020 Cenga.docx
 
CORPORATE TRAINING .docx
CORPORATE TRAINING                                            .docxCORPORATE TRAINING                                            .docx
CORPORATE TRAINING .docx
 
Corporate TAX homework problems. Need help with solving. email is .docx
Corporate TAX homework problems. Need help with solving. email is .docxCorporate TAX homework problems. Need help with solving. email is .docx
Corporate TAX homework problems. Need help with solving. email is .docx
 
Corporate Valuation and Financial PlanningCHAPTER 12© 2020 C.docx
Corporate Valuation and Financial PlanningCHAPTER 12© 2020 C.docxCorporate Valuation and Financial PlanningCHAPTER 12© 2020 C.docx
Corporate Valuation and Financial PlanningCHAPTER 12© 2020 C.docx
 

Recently uploaded

Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 

Recently uploaded (20)

Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 

Copyright©2016byMcGraw-HillEducation.Allrights.docx