Andress | The Basics of Information Security | E-Book | sack.de
E-Book

E-Book, Englisch, 208 Seiten

Andress The Basics of Information Security

Understanding the Fundamentals of InfoSec in Theory and Practice
1. Auflage 2011
ISBN: 978-1-59749-654-4
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

Understanding the Fundamentals of InfoSec in Theory and Practice

E-Book, Englisch, 208 Seiten

ISBN: 978-1-59749-654-4
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use. The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom. This book is an ideal reference for security consultants, IT managers, students, and those new to the InfoSec field. - Learn about information security without wading through huge manuals - Covers both theoretical and practical aspects of information security - Gives a broad view of the information security field for practitioners, students, and enthusiasts

Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.

Andress The Basics of Information Security jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;FRONT COVER;1
2;THE BASICS OF INFORMATION SECURITY;4
3;COPYRIGHT PAGE;5
4;CONTENTS;8
5;ABOUT THE AUTHOR;10
6;ABOUT THE TECHNICAL EDITOR;12
7;FOREWORD;14
8;INTRODUCTION;16
9;CHAPTER 1 What is Information Security?;20
9.1;Introduction;20
9.2;What is security?;21
9.3;Models for discussing security issues;23
9.4;Attacks;27
9.5;Defense in depth;31
9.6;Summary;33
9.7;Exercises;34
9.8;Bibliography;35
10;CHAPTER 2 Identification and Authentication;36
10.1;Introduction;36
10.2;Identification;37
10.3;Authentication;39
10.4;Summary;48
10.5;Exercises;49
10.6;Bibliography;49
11;CHAPTER 3 Authorization and Access Control;52
11.1;Introduction;52
11.2;Authorization;53
11.3;Access control;54
11.4;Access control methodologies;61
11.5;Summary;66
11.6;Exercises;67
11.7;Bibliography;67
12;CHAPTER 4 Auditing and Accountability;70
12.1;Introduction;70
12.2;Accountability;71
12.3;Auditing;74
12.4;Summary;79
12.5;Exercises;80
12.6;Bibliography;80
13;CHAPTER 5 Cryptography;82
13.1;Introduction;82
13.2;History;83
13.3;Modern cryptographic tools;88
13.4;Protecting data at rest, in motion, and in use;93
13.5;Summary;98
13.6;Exercises;99
13.7;Bibliography;99
14;CHAPTER 6 Operations Security;100
14.1;Introduction;100
14.2;Origins of operations security;101
14.3;The operations security process;104
14.4;Laws of operations security;108
14.5;Operations security in our personal lives;110
14.6;Summary;112
14.7;Exercises;113
14.8;Bibliography;113
15;CHAPTER 7 Physical Security;116
15.1;Introduction;116
15.2;Physical security controls;118
15.3;Protecting people;120
15.4;Protecting data;124
15.5;Protecting equipment;127
15.6;Summary;131
15.7;Exercises;132
15.8;Bibliography;133
16;CHAPTER 8 Network Security;134
16.1;Introduction;134
16.2;Protecting networks;135
16.3;Protecting network traffic;140
16.4;Network security tools;143
16.5;Summary;148
16.6;Exercises;148
16.7;Bibliography;148
17;CHAPTER 9 Operating System Security;150
17.1;Introduction;150
17.2;Operating system hardening;151
17.3;Protecting against malware;156
17.4;Software firewalls and host intrusion detection;158
17.5;Operating system security tools;159
17.6;Summary;163
17.7;Exercises;163
17.8;Bibliography;164
18;CHAPTER 10 Application Security;166
18.1;Introduction;166
18.2;Software development vulnerabilities;167
18.3;Web security;171
18.4;Database security;174
18.5;Application security tools;178
18.6;Summary;183
18.7;Exercises;184
18.8;Bibliography;184
19;INDEX;186



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.