Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9948025520802882
    Format: 1 online resource (190 p.)
    ISBN: 1-283-13401-2 , 9786613134011 , 1-59749-654-5
    Content: As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. It covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability. Then it dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. Learn about information security without wading through huge manualsCovers both theoretical and practical aspects o
    Note: Description based upon print version of record. , FRONT COVER; THE BASICS OF INFORMATION SECURITY; COPYRIGHT PAGE; CONTENTS; ABOUT THE AUTHOR; ABOUT THE TECHNICAL EDITOR; FOREWORD; INTRODUCTION; CHAPTER 1 What is Information Security?; Introduction; What is security?; Models for discussing security issues; Attacks; Defense in depth; Summary; Exercises; Bibliography; CHAPTER 2 Identification and Authentication; Introduction; Identification; Authentication; Summary; Exercises; Bibliography; CHAPTER 3 Authorization and Access Control; Introduction; Authorization; Access control; Access control methodologies; Summary; Exercises; Bibliography , CHAPTER 4 Auditing and AccountabilityIntroduction; Accountability; Auditing; Summary; Exercises; Bibliography; CHAPTER 5 Cryptography; Introduction; History; Modern cryptographic tools; Protecting data at rest, in motion, and in use; Summary; Exercises; Bibliography; CHAPTER 6 Operations Security; Introduction; Origins of operations security; The operations security process; Laws of operations security; Operations security in our personal lives; Summary; Exercises; Bibliography; CHAPTER 7 Physical Security; Introduction; Physical security controls; Protecting people; Protecting data , Protecting equipmentSummary; Exercises; Bibliography; CHAPTER 8 Network Security; Introduction; Protecting networks; Protecting network traffic; Network security tools; Summary; Exercises; Bibliography; CHAPTER 9 Operating System Security; Introduction; Operating system hardening; Protecting against malware; Software firewalls and host intrusion detection; Operating system security tools; Summary; Exercises; Bibliography; CHAPTER 10 Application Security; Introduction; Software development vulnerabilities; Web security; Database security; Application security tools; Summary; Exercises , BibliographyINDEX , English
    Additional Edition: ISBN 1-59749-653-7
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Electronic books ; Electronic books ; Electronic books
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages