Foundation of Information Security : A Straight Forward Introduction
Material type:
- 9781718500044
- 005.8 AND-F
Item type | Current library | Collection | Call number | Status | Barcode | |
---|---|---|---|---|---|---|
![]() |
Air University Kharian Campus Library Computer Science | Computer Science | 005.8 AND-F (Browse shelf(Opens below)) | Available | AUKHP0322 |
Browsing Air University Kharian Campus Library shelves, Shelving location: Computer Science , Collection: Computer Science Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.75 MOR-M Microsoft® Exchange Server 2013 Unleashed | 005.756 FAR-O Oracle Exadata Expert's Handbook | 005.8 AMM-I Introduction to Software Testing | 005.8 AND-F Foundation of Information Security : A Straight Forward Introduction | 005.8 BAS-M Mastering Blockchain A Technical Guide to the Inner workings of blockchain, from cryptography to DeFi and NFTs | 005.8 BEA-H Hacking For Dummies | 005.8 BLO-C CEH v9 Certified Ethical Hacker version 9 Practice tests |
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.
Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.
You'll also learn the basics of topics like:
Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process
The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates
The laws and regulations that protect systems and data
Anti-malware tools, firewalls, and intrusion detection systems
Vulnerabilities such as buffer overflows and race conditions
A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
Include Index.
There are no comments on this title.