Foundations of Information Security: A Straightforward Introduction

Foundations of Information Security: A Straightforward Introduction

English | October 15th, 2019 | ISBN: 1718500041 | 248 Pages | EPUB (True/Retail Copy) | 23.01 MB

High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.

In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.

Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.

You'll also learn the basics of topics like:
Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process
The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates
The laws and regulations that protect systems and data
Anti-malware tools, firewalls, and intrusion detection systems
Vulnerabilities such as buffer overflows and race conditions

A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.


[Fast Download] Foundations of Information Security: A Straightforward Introduction

Related eBooks:
Financial Cryptography and Data Security: 23rd International Conference, FC 2019, Frigate Bay, St. K
Imaging of Urinary Tract Diverticula
Adaptive Cryptographic Access Control
Code Breaking in the Pacific
Cryptography (River Publishers Series in Information Science and Technology)
Symmetric Cryptographic Protocols
Unconventional Computation and Natural Computation: 16th International Conference, UCNC 2017, Fayett
Foundations of Blockchain
Information Security and Cryptology - ICISC 2015: 18th International Conference, Seoul, South Korea
A Course in Number Theory and Cryptography, 2nd edition
The Once and Future Turing: Computing the World
RSA Security's Official Guide to Cryptography
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.