000 02021nam a2200229Ia 4500
003 NULRC
005 20250520103030.0
008 250520s9999 xx 000 0 und d
020 _a9781718500044
040 _cNULRC
050 _aQA 76.9.A25 .A54 2019
100 _aAndress, Jason.
_eauthor
245 0 _aFoundations of information security :
_ba straightforward introduction /
_cJason Andress
260 _aSan Francisco, California :
_bNo Starch Press, Inc.,
_cc2019
300 _axxi, 222 pages :
_billustrations ;
_c23 cm.
365 _bUSD29
504 _aIncludes index.
505 _aChapter1.What is information security -- Chapter2.Identification and authentication -- Chapter3.Authorization and access controls -- Chapter4.Auditing and accountability -- Chapter5.Cryptography -- Chapter6.Compliance, laws and regulations -- Chapter7.Operations security -- Chapter8.Human element security -- Chapter9.Physical security -- Chapter10.Network security -- Chapter11.Operating system security -- Chapter12.Mobile, embedded and internet of things security -- Chapter13.Application security -- Chapter14.Assessing security.
520 _aIn this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing. Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
650 _aCOMPUTER SECURITY
942 _2lcc
_cBK
999 _c21835
_d21835