
Foundations of Information Security A Straightforward Introduction
by Andress, Jason-
This Item Qualifies for Free Shipping!*
*Excludes marketplace orders.
-
We Buy This Book Back!
Buy New
Buy Used
Rent Book
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.
Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.
You'll also learn the basics of topics like:
• Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process
• The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates
• The laws and regulations that protect systems and data
• Anti-malware tools, firewalls, and intrusion detection systems
• Vulnerabilities such as buffer overflows and race conditions
A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
Author Biography
Table of Contents
Chapter 1: What is Information Security?
Chapter 2: Indentification and Authentication
Chapter 3: Authorization and Access Control
Chapter 4: Auditing and Accountability
Chapter 5: Cryptography
Chapter 6: Compliance, Laws, and Regulations
Chapter 7: Operations Security
Chapter 8: Human Element Security
Chapter 9: Physical Security
Chapter 10: Network Security
Chapter 11: Operating System Security
Chapter 12: Mobile, Embedded, and Internet of Things Security
Chapter 13: Application Security
Chapter 14: Assessing Security
Notes
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.