UID:
almahu_9948025520802882
Format:
1 online resource (190 p.)
ISBN:
1-283-13401-2
,
9786613134011
,
1-59749-654-5
Content:
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. It covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability. Then it dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. Learn about information security without wading through huge manualsCovers both theoretical and practical aspects o
Note:
Description based upon print version of record.
,
FRONT COVER; THE BASICS OF INFORMATION SECURITY; COPYRIGHT PAGE; CONTENTS; ABOUT THE AUTHOR; ABOUT THE TECHNICAL EDITOR; FOREWORD; INTRODUCTION; CHAPTER 1 What is Information Security?; Introduction; What is security?; Models for discussing security issues; Attacks; Defense in depth; Summary; Exercises; Bibliography; CHAPTER 2 Identification and Authentication; Introduction; Identification; Authentication; Summary; Exercises; Bibliography; CHAPTER 3 Authorization and Access Control; Introduction; Authorization; Access control; Access control methodologies; Summary; Exercises; Bibliography
,
CHAPTER 4 Auditing and AccountabilityIntroduction; Accountability; Auditing; Summary; Exercises; Bibliography; CHAPTER 5 Cryptography; Introduction; History; Modern cryptographic tools; Protecting data at rest, in motion, and in use; Summary; Exercises; Bibliography; CHAPTER 6 Operations Security; Introduction; Origins of operations security; The operations security process; Laws of operations security; Operations security in our personal lives; Summary; Exercises; Bibliography; CHAPTER 7 Physical Security; Introduction; Physical security controls; Protecting people; Protecting data
,
Protecting equipmentSummary; Exercises; Bibliography; CHAPTER 8 Network Security; Introduction; Protecting networks; Protecting network traffic; Network security tools; Summary; Exercises; Bibliography; CHAPTER 9 Operating System Security; Introduction; Operating system hardening; Protecting against malware; Software firewalls and host intrusion detection; Operating system security tools; Summary; Exercises; Bibliography; CHAPTER 10 Application Security; Introduction; Software development vulnerabilities; Web security; Database security; Application security tools; Summary; Exercises
,
BibliographyINDEX
,
English
Additional Edition:
ISBN 1-59749-653-7
Language:
English
Subjects:
Computer Science
Keywords:
Electronic books
;
Electronic books
;
Electronic books
URL:
Volltext
(lizenzpflichtig)