The Basics of Information Security : Understanding the Fundamentals of InfoSec in Theory and Practice
By: Andress, Jason.Material type: TextSeries: eBooks on Demand.Publisher: Saint Louis : Elsevier Science, 2014Description: 1 online resource (190 p.).ISBN: 9781597496544.Subject(s): Computer networks - Security measures | Computer networks -- Security measures | Computer security | Computer security | Information resources management | Information resources managementGenre/Form: Electronic books.Additional physical formats: Print version:: The Basics of Information Security : Understanding the Fundamentals of InfoSec in Theory and PracticeDDC classification: 005.8 LOC classification: QA76.9.A25 A5453 2011Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.9.A25 A5453 2011 (Browse shelf)||http://uttyler.eblib.com/patron/FullRecord.aspx?p=713616||Available||EBL713616|
Browsing UT Tyler Online Shelves , Shelving location: Online Close shelf browser
|QA76.9.A25 .A384 2014 The Browser Hacker's Handbook.||QA76.9.A25 .A384 2014 Architecting User-Centric Privacy-as-a-Set-of-Services :||QA76.9.A25.A537 2017 Coding for Penetration Testers :||QA76.9.A25 A5453 2011 The Basics of Information Security :||QA76.9.A25 .A568 2013 Data and Applications Security and Privacy XXVII :||QA76.9.A25 A67 2008 Application Security in the ISO27001 Environment.||QA76.9.A25 A73 2014 Architectures and protocols for secure information technology infrastructures /|
FRONT COVER; THE BASICS OF INFORMATION SECURITY; COPYRIGHT PAGE; CONTENTS; ABOUT THE AUTHOR; ABOUT THE TECHNICAL EDITOR; FOREWORD; INTRODUCTION; CHAPTER 1 What is Information Security?; Introduction; What is security?; Models for discussing security issues; Attacks; Defense in depth; Summary; Exercises; Bibliography; CHAPTER 2 Identification and Authentication; Introduction; Identification; Authentication; Summary; Exercises; Bibliography; CHAPTER 3 Authorization and Access Control; Introduction; Authorization; Access control; Access control methodologies; Summary; Exercises; Bibliography
CHAPTER 4 Auditing and AccountabilityIntroduction; Accountability; Auditing; Summary; Exercises; Bibliography; CHAPTER 5 Cryptography; Introduction; History; Modern cryptographic tools; Protecting data at rest, in motion, and in use; Summary; Exercises; Bibliography; CHAPTER 6 Operations Security; Introduction; Origins of operations security; The operations security process; Laws of operations security; Operations security in our personal lives; Summary; Exercises; Bibliography; CHAPTER 7 Physical Security; Introduction; Physical security controls; Protecting people; Protecting data
Protecting equipmentSummary; Exercises; Bibliography; CHAPTER 8 Network Security; Introduction; Protecting networks; Protecting network traffic; Network security tools; Summary; Exercises; Bibliography; CHAPTER 9 Operating System Security; Introduction; Operating system hardening; Protecting against malware; Software firewalls and host intrusion detection; Operating system security tools; Summary; Exercises; Bibliography; CHAPTER 10 Application Security; Introduction; Software development vulnerabilities; Web security; Database security; Application security tools; Summary; Exercises
As part of the Syngress Basics series, <i>The Basics of Information Security</i> provides you with fundamental knowledge of information security in both theoretical and practical aspects. It covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability. Then it dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. <br><br><ul><li>Learn about information security without wading through huge manuals</li><li>Covers both theoretical and practical aspects of inf
Description based upon print version of record.