Foundations of information security : a straightforward introduction / Jason Andress
Material type:
- 9781718500044
- QA 76.9.A25 .A54 2019

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Digital Forensic | GC QA 76.9.A25 .A54 2019 c.2 (Browse shelf(Opens below)) | c.2 | Available | NULIB000019594 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Digital Forensic Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.9 .M65 2021 SQL cookbook : query solutions and techniques for all SQL users / | GC QA 76.9 .R63 2021 Advanced algorithms and data structures / | GC QA 76.9.A5 .A44 2008 Information security management principles: an ISEB Certificate / | GC QA 76.9.A25 .A54 2019 c.2 Foundations of information security : a straightforward introduction / | GC QA 76.9.A25 .B63 2022 Learn wireshark : a definitive guide to expertly analyzing protocols and troubleshooting networks using wireshark / | GC QA 76.9.A25 .B83 2011 c.1 Introduction to security and network forensics / | GC QA 76.9.A25 .B83 2011 c.2 Introduction to security and network forensics / |
Includes index.
Chapter1.What is information security -- Chapter2.Identification and authentication -- Chapter3.Authorization and access controls -- Chapter4.Auditing and accountability -- Chapter5.Cryptography -- Chapter6.Compliance, laws and regulations -- Chapter7.Operations security -- Chapter8.Human element security -- Chapter9.Physical security -- Chapter10.Network security -- Chapter11.Operating system security -- Chapter12.Mobile, embedded and internet of things security -- Chapter13.Application security -- Chapter14.Assessing security.
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing. Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
There are no comments on this title.