Foundations of information security : a straightforward introduction / Jason Andress
Material type:

Item type | Current library | Home library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|---|
![]() |
LRC - Annex | National University - Manila | Accounting Technology / Accounting Information System | General Circulation | GC QA 76.9.A25 .A54 2019 (Browse shelf (Opens below)) | c.1 | Available | NULIB000018195 | |
![]() |
LRC - Annex | National University - Manila | Digital Forensic | General Circulation | GC QA 76.9.A25 .A54 2019 c.2 (Browse shelf (Opens below)) | c.2 | Available | NULIB000019594 |
Browsing National University - Manila shelves, Shelving location: General Circulation, Collection: Accounting Technology / Accounting Information System Close shelf browser (Hides shelf browser)
No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC HF 5635 .W37 2014 Financial and managerial accounting / | GC HF 5635 .W55 2014 Financial accounting : information for decisions / | GC HF 5679 .H87 2016 Accounting information systems : basic concepts and current issues / | GC QA 76.9.A25 .A54 2019 Foundations of information security : a straightforward introduction / | GC QA 76.9.S88 .T55 2017 Systems analysis and design / | GC T 58.6 .L38 2018 Management information systems : managing the digital firm / | GC T 58.6 .M36 2019 Management information systems : DANTES/DSST study guide. |
Includes index.
Chapter1.What is information security -- Chapter2.Identification and authentication -- Chapter3.Authorization and access controls -- Chapter4.Auditing and accountability -- Chapter5.Cryptography -- Chapter6.Compliance, laws and regulations -- Chapter7.Operations security -- Chapter8.Human element security -- Chapter9.Physical security -- Chapter10.Network security -- Chapter11.Operating system security -- Chapter12.Mobile, embedded and internet of things security -- Chapter13.Application security -- Chapter14.Assessing security.
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.
Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.
A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
There are no comments on this title.