MARC details
000 -LEADER |
fixed length control field |
02023nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520102958.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781718500044 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76.9.A25 .A54 2019 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Andress, Jason. |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Foundations of information security : |
Remainder of title |
a straightforward introduction / |
Statement of responsibility, etc. |
Jason Andress |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
San Francisco, California : |
Name of publisher, distributor, etc. |
No Starch Press, Inc., |
Date of publication, distribution, etc. |
c2019 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 222 pages : |
Other physical details |
illustrations ; |
Dimensions |
23 cm. |
365 ## - TRADE PRICE |
Price amount |
USD25.3 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter1.What is information security -- Chapter2.Identification and authentication -- Chapter3.Authorization and access controls -- Chapter4.Auditing and accountability -- Chapter5.Cryptography -- Chapter6.Compliance, laws and regulations -- Chapter7.Operations security -- Chapter8.Human element security -- Chapter9.Physical security -- Chapter10.Network security -- Chapter11.Operating system security -- Chapter12.Mobile, embedded and internet of things security -- Chapter13.Application security -- Chapter14.Assessing security. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing. Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER SECURITY |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |