Foundations of Information Security

A Straightforward Introduction
Sofort lieferbar | Lieferzeit: Sofort lieferbar I

37,64 €*

Alle Preise inkl. MwSt.|Versandkostenfrei
ISBN-13:
9781718500044
Veröffentl:
2019
Erscheinungsdatum:
01.10.2019
Seiten:
222
Autor:
Jason Andress
Gewicht:
486 g
Format:
236x177x20 mm
Sprache:
Englisch
Beschreibung:

High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. You'll also learn the basics of topics like: • Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process • The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates • The laws and regulations that protect systems and data • Anti-malware tools, firewalls, and intrusion detection systems • Vulnerabilities such as buffer overflows and race conditionsA valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
IntroductionChapter 1: What is Information Security?Chapter 2: Indentification and AuthenticationChapter 3: Authorization and Access ControlChapter 4: Auditing and AccountabilityChapter 5: CryptographyChapter 6: Compliance, Laws, and RegulationsChapter 7: Operations SecurityChapter 8: Human Element SecurityChapter 9: Physical SecurityChapter 10: Network SecurityChapter 11: Operating System SecurityChapter 12: Mobile, Embedded, and Internet of Things SecurityChapter 13: Application SecurityChapter 14: Assessing SecurityNotes

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga