|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1125343415 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
191030s2019 caua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d YDX
|d EBLCP
|d K6U
|d UKAHL
|d CZL
|d TOH
|d OCLCQ
|d OCLCO
|d KSU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1129222485
|
020 |
|
|
|z 9781718500044
|
035 |
|
|
|a (OCoLC)1125343415
|z (OCoLC)1129222485
|
037 |
|
|
|a CL0501000079
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Andress, Jason,
|e author.
|
245 |
1 |
0 |
|a Foundations of information security :
|b a straightforward introduction /
|c Jason Andress.
|
264 |
|
1 |
|a San Francisco, CA :
|b No Starch Press,
|c [2019]
|
264 |
|
4 |
|c ©2019
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed October 24, 2019).
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, this book is a great place to start your journey into the dynamic and rewarding field of information security. --
|c Edited summary from book.
|
505 |
0 |
|
|a Intro -- Title Page -- Copyright Page -- Dedication -- About the Author -- About the Technical Reviewer -- BRIEF CONTENTS -- CONTENTS IN DETAIL -- ACKNOWLEDGMENTS -- INTRODUCTION -- Who Should Read This Book? -- About This Book -- 1 WHAT IS INFORMATION SECURITY? -- Defining Information Security -- When Are You Secure? -- Models for Discussing Security Issues -- Attacks -- Defense in Depth -- Summary -- Exercises -- 2 IDENTIFICATION AND AUTHENTICATION -- Identification -- Authentication -- Common Identification and Authentication Methods -- Summary -- Exercises -- 3 AUTHORIZATION AND ACCESS CONTROLS -- What Are Access Controls? -- Implementing Access Controls -- Access Control Models -- Physical Access Controls -- Summary -- Exercises -- 4 AUDITING AND ACCOUNTABILITY -- Accountability -- Security Benefits of Accountability -- Auditing -- Summary -- Exercises -- 5 CRYPTOGRAPHY -- The History of Cryptography -- Modern Cryptographic Tools -- Protecting Data at Rest, in Motion, and in Use -- Summary -- Exercises -- 6 COMPLIANCE, LAWS, AND REGULATIONS -- What Is Compliance? -- Achieving Compliance with Controls -- Maintaining Compliance -- Laws and Information Security -- Adopting Frameworks for Compliance -- Compliance amid Technological Changes -- Summary -- Exercises -- 7 OPERATIONS SECURITY -- The Operations Security Process -- Laws of Operations Security -- Operations Security in Our Personal Lives -- Origins of Operations Security -- Summary -- Exercises -- 8 HUMAN ELEMENT SECURITY -- Gathering Information for Social Engineering Attacks -- Types of Social Engineering Attacks -- Building Security Awareness with Security Training Programs -- Summary -- Exercises -- 9 PHYSICAL SECURITY -- Identifying Physical Threats -- Physical Security Controls -- Protecting People -- Protecting Data -- Protecting Equipment -- Summary -- Exercises.
|
505 |
8 |
|
|a 10 NETWORK SECURITY -- Protecting Networks -- Protecting Network Traffic -- Network Security Tools -- Summary -- Exercises -- 11 OPERATING SYSTEM SECURITY -- Operating System Hardening -- Protecting Against Malware -- Operating System Security Tools -- Summary -- Exercises -- 12 MOBILE, EMBEDDED, AND INTERNET OF THINGS SECURITY -- Mobile Security -- Embedded Security -- Internet of Things Security -- Summary -- Exercises -- 13 APPLICATION SECURITY -- Software Development Vulnerabilities -- Web Security -- Database Security -- Application Security Tools -- Summary -- Exercises -- 14 ASSESSING SECURITY -- Vulnerability Assessment -- Penetration Testing -- Does This Really Mean You're Secure? -- Summary -- Exercises -- NOTES -- INDEX.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Electronic information resources
|x Access control.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sources d'information électroniques
|x Accès
|x Contrôle.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Electronic information resources
|x Access control
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098122546/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36385130
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6071693
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 300847590
|
994 |
|
|
|a 92
|b IZTAP
|