Foundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Each chapter explores one main security concept, lists scenarios in which the concept is applicable, and discusses the implementation of that concept in detail, often by going over rival models or strategies. Readers will come away with a sense of what types of assets need protecting, what kinds of risks exist, and what kinds of defensive measures can be taken.
Rezensionen / Stimmen
"This book is an excellent starting point for future security professionals but also network and system administrators."
-Help Net Security
"A thorough overview for many different areas within security. The author explains what and more importantly why, then illustrates each concept with concrete, realistic examples. Definitely a great addition to any security engineer's library, but also less technical people who want to learn more about common topics like defense in depth."
-Seth Foley
"If you're new to info security or are looking to refresh your knowledge, then this is an ideal book. It's easy to read and makes the information fun to consume."
-HaXez, Blogger and YouTuber
Sprache
Verlagsort
Maße
Höhe: 236 mm
Breite: 177 mm
Dicke: 20 mm
Gewicht
ISBN-13
978-1-7185-0004-4 (9781718500044)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Dr. Jason Andress is a seasoned security professional, security researcher, and technophile. He has been writing on security topics for over a decade, covering data security, network security, hardware security, penetration testing, and digital forensics, among others.
Introduction
Chapter 1: What is Information Security?
Chapter 2: Indentification and Authentication
Chapter 3: Authorization and Access Control
Chapter 4: Auditing and Accountability
Chapter 5: Cryptography
Chapter 6: Compliance, Laws, and Regulations
Chapter 7: Operations Security
Chapter 8: Human Element Security
Chapter 9: Physical Security
Chapter 10: Network Security
Chapter 11: Operating System Security
Chapter 12: Mobile, Embedded, and Internet of Things Security
Chapter 13: Application Security
Chapter 14: Assessing Security
Notes