Foundations of information security a straightforward introduction

A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, this book is a great place to start your journey into the dynamic and rewarding field of information security. --

Bibliographic Details
Main Author: Andress, Jason
Format: eBook
Language:English
Published: San Francisco, CA No Starch Press 2019
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04335nmm a2200385 u 4500
001 EB001921553
003 EBX01000000000000001084455
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
050 4 |a QA76.9.A25 
100 1 |a Andress, Jason 
245 0 0 |a Foundations of information security  |b a straightforward introduction  |c Jason Andress 
260 |a San Francisco, CA  |b No Starch Press  |c 2019 
300 |a 1 volume  |b illustrations 
505 0 |a Intro -- Title Page -- Copyright Page -- Dedication -- About the Author -- About the Technical Reviewer -- BRIEF CONTENTS -- CONTENTS IN DETAIL -- ACKNOWLEDGMENTS -- INTRODUCTION -- Who Should Read This Book? -- About This Book -- 1 WHAT IS INFORMATION SECURITY? -- Defining Information Security -- When Are You Secure? -- Models for Discussing Security Issues -- Attacks -- Defense in Depth -- Summary -- Exercises -- 2 IDENTIFICATION AND AUTHENTICATION -- Identification -- Authentication -- Common Identification and Authentication Methods -- Summary -- Exercises -- 3 AUTHORIZATION AND ACCESS CONTROLS -- What Are Access Controls? -- Implementing Access Controls -- Access Control Models -- Physical Access Controls -- Summary -- Exercises -- 4 AUDITING AND ACCOUNTABILITY -- Accountability -- Security Benefits of Accountability -- Auditing -- Summary -- Exercises -- 5 CRYPTOGRAPHY -- The History of Cryptography -- Modern Cryptographic Tools -- Protecting Data at Rest, in Motion, and in Use -- Summary -- Exercises -- 6 COMPLIANCE, LAWS, AND REGULATIONS -- What Is Compliance? -- Achieving Compliance with Controls -- Maintaining Compliance -- Laws and Information Security -- Adopting Frameworks for Compliance -- Compliance amid Technological Changes -- Summary -- Exercises -- 7 OPERATIONS SECURITY -- The Operations Security Process -- Laws of Operations Security -- Operations Security in Our Personal Lives -- Origins of Operations Security -- Summary -- Exercises -- 8 HUMAN ELEMENT SECURITY -- Gathering Information for Social Engineering Attacks -- Types of Social Engineering Attacks -- Building Security Awareness with Security Training Programs -- Summary -- Exercises -- 9 PHYSICAL SECURITY -- Identifying Physical Threats -- Physical Security Controls -- Protecting People -- Protecting Data -- Protecting Equipment -- Summary -- Exercises 
505 0 |a Includes bibliographical references and index 
505 0 |a 10 NETWORK SECURITY -- Protecting Networks -- Protecting Network Traffic -- Network Security Tools -- Summary -- Exercises -- 11 OPERATING SYSTEM SECURITY -- Operating System Hardening -- Protecting Against Malware -- Operating System Security Tools -- Summary -- Exercises -- 12 MOBILE, EMBEDDED, AND INTERNET OF THINGS SECURITY -- Mobile Security -- Embedded Security -- Internet of Things Security -- Summary -- Exercises -- 13 APPLICATION SECURITY -- Software Development Vulnerabilities -- Web Security -- Database Security -- Application Security Tools -- Summary -- Exercises -- 14 ASSESSING SECURITY -- Vulnerability Assessment -- Penetration Testing -- Does This Really Mean You're Secure? -- Summary -- Exercises -- NOTES -- INDEX. 
653 |a Sécurité informatique 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer networks / Security measures / fast 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Sources d'information électroniques / Accès / Contrôle 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Electronic information resources / Access control / fast 
653 |a Electronic information resources / Access control / http://id.loc.gov/authorities/subjects/sh99010373 
653 |a Computer security / fast 
653 |a Computer Security 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9781718500044 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781098122546/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, this book is a great place to start your journey into the dynamic and rewarding field of information security. --