Foundations of Information Security: A Straightforward Introduction
Authors: Jason Andress
ISBN-10: 1718500041
ISBN-13: 9781718500044
Publication Date 出版日期: 2019-10-07
Print Length 页数: 248 pages
Book Description
By finelybook
High-level overview of the information security field. Covers key concepts like confidentiality,integrity,and availability,then dives into practical applications of these ideas in the areas of operational,physical,network,application,and operating system security.
In this high-level survey of the information security field,best-selling author Jason Andress covers the basics of a wide variety of topics,from authentication and authorization to maintaining confidentiality and performing penetration testing.
Using real-world security breaches as examples,Foundations of Information Security explores common applications of these concepts,such as operations security,network design,hardening and patching operating systems,securing mobile devices,as well as tools for assessing the security of hosts and applications.
You’ll also learn the basics of topics like:
Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process
The principles behind modern cryptography,including symmetric and asymmetric algorithms,hashes,and certificates
The laws and regulations that protect systems and data
Anti-malware tools,firewalls,and intrusion detection systems
Vulnerabilities such as buffer overflows and race conditions
A valuable resource for beginning security professionals,network systems administrators,or anyone new to the field,Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
CONTENTS IN DETAIL
ACKNOWLEDGMENTS
INTRODUCTION
1WHAT IS INFORMATION SECURITY?
2 IDENTIFICATION AND AUTHENTICATION
3 AUTHORIZATION AND ACCESS CONTROLS
4 AUDITING AND ACCOUNTABILITY
5CRYPTOGRAPHY
6COMPLIANCE,LAWS,AND REGULATIONS
7 OPERATIONS SECURITY
8 HUMAN ELEMENT SECURITY
9 PHYSICAL SECURITY
10NETWORK SECURITY
11 OPERATING SYSTEM SECURITY
12 MOBILE,EMBEDDED,AND INTERNET OF THINGS SECURITY
13APPLICATION SECURITY
14ASSESSING SECURITY
NOTES
INDEX