|
|
|
|
LEADER |
04335nmm a2200385 u 4500 |
001 |
EB001921553 |
003 |
EBX01000000000000001084455 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Andress, Jason
|
245 |
0 |
0 |
|a Foundations of information security
|b a straightforward introduction
|c Jason Andress
|
260 |
|
|
|a San Francisco, CA
|b No Starch Press
|c 2019
|
300 |
|
|
|a 1 volume
|b illustrations
|
505 |
0 |
|
|a Intro -- Title Page -- Copyright Page -- Dedication -- About the Author -- About the Technical Reviewer -- BRIEF CONTENTS -- CONTENTS IN DETAIL -- ACKNOWLEDGMENTS -- INTRODUCTION -- Who Should Read This Book? -- About This Book -- 1 WHAT IS INFORMATION SECURITY? -- Defining Information Security -- When Are You Secure? -- Models for Discussing Security Issues -- Attacks -- Defense in Depth -- Summary -- Exercises -- 2 IDENTIFICATION AND AUTHENTICATION -- Identification -- Authentication -- Common Identification and Authentication Methods -- Summary -- Exercises -- 3 AUTHORIZATION AND ACCESS CONTROLS -- What Are Access Controls? -- Implementing Access Controls -- Access Control Models -- Physical Access Controls -- Summary -- Exercises -- 4 AUDITING AND ACCOUNTABILITY -- Accountability -- Security Benefits of Accountability -- Auditing -- Summary -- Exercises -- 5 CRYPTOGRAPHY -- The History of Cryptography -- Modern Cryptographic Tools -- Protecting Data at Rest, in Motion, and in Use -- Summary -- Exercises -- 6 COMPLIANCE, LAWS, AND REGULATIONS -- What Is Compliance? -- Achieving Compliance with Controls -- Maintaining Compliance -- Laws and Information Security -- Adopting Frameworks for Compliance -- Compliance amid Technological Changes -- Summary -- Exercises -- 7 OPERATIONS SECURITY -- The Operations Security Process -- Laws of Operations Security -- Operations Security in Our Personal Lives -- Origins of Operations Security -- Summary -- Exercises -- 8 HUMAN ELEMENT SECURITY -- Gathering Information for Social Engineering Attacks -- Types of Social Engineering Attacks -- Building Security Awareness with Security Training Programs -- Summary -- Exercises -- 9 PHYSICAL SECURITY -- Identifying Physical Threats -- Physical Security Controls -- Protecting People -- Protecting Data -- Protecting Equipment -- Summary -- Exercises
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a 10 NETWORK SECURITY -- Protecting Networks -- Protecting Network Traffic -- Network Security Tools -- Summary -- Exercises -- 11 OPERATING SYSTEM SECURITY -- Operating System Hardening -- Protecting Against Malware -- Operating System Security Tools -- Summary -- Exercises -- 12 MOBILE, EMBEDDED, AND INTERNET OF THINGS SECURITY -- Mobile Security -- Embedded Security -- Internet of Things Security -- Summary -- Exercises -- 13 APPLICATION SECURITY -- Software Development Vulnerabilities -- Web Security -- Database Security -- Application Security Tools -- Summary -- Exercises -- 14 ASSESSING SECURITY -- Vulnerability Assessment -- Penetration Testing -- Does This Really Mean You're Secure? -- Summary -- Exercises -- NOTES -- INDEX.
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Computer networks / Security measures / fast
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Sources d'information électroniques / Accès / Contrôle
|
653 |
|
|
|a Computer security / http://id.loc.gov/authorities/subjects/sh90001862
|
653 |
|
|
|a Electronic information resources / Access control / fast
|
653 |
|
|
|a Electronic information resources / Access control / http://id.loc.gov/authorities/subjects/sh99010373
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Computer Security
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 9781718500044
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098122546/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, this book is a great place to start your journey into the dynamic and rewarding field of information security. --
|