Cargando…

The basics of information security : understanding the fundamentals of InfoSec in theory and practice /

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Andress, Jason (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, 2014.
Edición:Second edition.
Colección:Syngress basics series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn880706587
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 140530s2014 mau ob 001 0 eng d
040 |a OPELS  |b eng  |e rda  |e pn  |c OPELS  |d N$T  |d OCLCO  |d YDXCP  |d E7B  |d UMI  |d OCLCF  |d DEBBG  |d DEBSZ  |d TPH  |d UNA  |d EBLCP  |d OCLCO  |d B24X7  |d COO  |d OCLCO  |d OCLCQ  |d OCLCO  |d VT2  |d OCLCO  |d LIV  |d MERUC  |d OCLCQ  |d IOG  |d OCLCO  |d OCLCA  |d U3W  |d D6H  |d CEF  |d OTZ  |d AU@  |d OCLCQ  |d WYU  |d CHVBK  |d OCLCO  |d YDX  |d OCLCO  |d OCLCA  |d OCLCQ  |d OCLCA  |d UK7LJ  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 881162098  |a 883127955  |a 898034970 
020 |a 9780128008126  |q (electronic bk.) 
020 |a 0128008121  |q (electronic bk.) 
020 |a 0128007443 
020 |a 9780128007440 
020 |z 9780128007440 
029 1 |a AU@  |b 000053138935 
029 1 |a AU@  |b 000067107778 
029 1 |a CHNEW  |b 000692138 
029 1 |a CHNEW  |b 000692141 
029 1 |a CHNEW  |b 000887795 
029 1 |a CHNEW  |b 001001017 
029 1 |a CHNEW  |b 001026526 
029 1 |a DEBBG  |b BV042031080 
029 1 |a DEBBG  |b BV042300251 
029 1 |a DEBBG  |b BV043610023 
029 1 |a DEBSZ  |b 413890570 
029 1 |a DEBSZ  |b 414186680 
029 1 |a DEBSZ  |b 431696926 
029 1 |a NLGGC  |b 389808814 
029 1 |a DKDLA  |b 820120-katalog:9910110645805765 
035 |a (OCoLC)880706587  |z (OCoLC)881162098  |z (OCoLC)883127955  |z (OCoLC)898034970 
037 |a CL0500000450  |b Safari Books Online 
050 4 |a QA76.9.A25  |b A5453 2014eb 
060 4 |a Online Book 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Andress, Jason,  |e author. 
245 1 4 |a The basics of information security :  |b understanding the fundamentals of InfoSec in theory and practice /  |c Jason Andress. 
250 |a Second edition. 
264 1 |a Waltham, MA :  |b Syngress,  |c 2014. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Syngress basics series 
588 0 |a Online resource; title from PDF title page (ScienceDirect, viewed May 30, 2014). 
500 |a Includes index. 
520 |a As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects. 
504 |a Includes bibliographical references and index. 
505 0 |a Front Cover; The Basics of Information Security; Copyright Page; Dedication; Contents; Author Biography; Introduction; Book overview and key learning points; Book audience; How this book is organized; Chapter 1: What is information security?; Chapter 2: Identification and authentication; Chapter 3: Authorization and access control; Chapter 4: Auditing and accountability; Chapter 5: Cryptography; Chapter 6: Laws and regulations; Chapter 7: Operations security; Chapter 8: Human element security; Chapter 9: Physical security; Chapter 10: Network security; Chapter 11: Operating system security. 
505 8 |a Chapter 12: Application securityConclusion; 1 What is Information Security?; Introduction; What is security?; When are we secure?; Alert!; Models for discussing security; The confidentiality, integrity, and availability triad; More advanced; Confidentiality; Integrity; Availability; Relating the CIA triad to security; The Parkerian hexad; Alert!; Confidentiality, integrity, and availability; Possession or control; Authenticity; Utility; Attacks; Types of attack payloads; Interception; Interruption; Modification; Fabrication; Threats, vulnerabilities, and risk; Threats; Vulnerabilities; Risk. 
505 8 |a ImpactRisk management; Identify assets; Identify threats; Assess vulnerabilities; Assess risks; Mitigating risks; Physical; Logical and technical controls; Administrative; Incident response; Preparation; Detection and analysis; Containment, eradication, and recovery; Post incident activity; Defense in depth; Layers; Information security in the real world; Summary; Exercises; References; 2 Identification and Authentication; Introduction; Identification; Who we claim to be; Identity verification; Falsifying identification; Authentication; Factors; Multifactor authentication. 
505 8 |a Mutual authenticationPasswords; More advanced; Biometrics; Additional resources; Characteristics; Measuring performance; Issues; Hardware tokens; Alert!; Identification and authentication in the real world; Summary; Exercises; References; 3 Authorization and Access Control; Introduction; Authorization; Principle of least privilege; Access control; More advanced; Access control lists; File system ACLs; More advanced; Network ACLs; Alert!; More advanced; Capabilities; Confused deputy problem; Alert!; Access control methodologies; Access control models; Discretionary access control. 
505 8 |a Mandatory access controlMore advanced; Role-based access control; Attribute-based access control; Multilevel access control; Physical access controls; Authorization and access control in the real world; Summary; Exercises; References; 4 Auditing and Accountability; Introduction; Accountability; More advanced; Security benefits of accountability; Nonrepudiation; Deterrence; More advanced; Intrusion detection and prevention; Admissibility of records; How we accomplish accountability; Auditing; What do we audit?; Alert!; Logging; Monitoring; Assessments. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Information technology  |x Security measures. 
650 0 |a Information resources management. 
650 0 |a Computer science. 
650 1 2 |a Computer Security 
650 1 2 |a Information Management 
650 2 |a Electronic Data Processing 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Gestion de l'information. 
650 6 |a Informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer science.  |2 fast  |0 (OCoLC)fst00872451 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Information resources management.  |2 fast  |0 (OCoLC)fst00972603 
650 7 |a Information technology  |x Security measures.  |2 fast  |0 (OCoLC)fst00973129 
776 0 8 |i Print version:  |z 9780128007440 
830 0 |a Syngress basics series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128007440/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00066986 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1699255 
938 |a ebrary  |b EBRY  |n ebr10875251 
938 |a EBSCOhost  |b EBSC  |n 786214 
938 |a YBP Library Services  |b YANK  |n 11833251 
994 |a 92  |b IZTAP