ITeBooks.directory Facebook Icon Image ITeBooks.directory Google Plus Icon Image ITeBooks.directory Twitter Icon Image

The Basics of Information Security

Understanding the Fundamentals of InfoSec in Theory and Practice

The Basics of Information Security Image

Book details:

Publisher:Syngress
Categories: Syngress , Practice
Author:
Edition:1
ISBN-10:1597496537
ISBN-13:9781597496537
Pages:208
Published:
Posted:May 15 2017
Language:English
Book format:PDF
Book size:2.83 MB

Book Description:

The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use. The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom. This book is an ideal reference for security consultants, IT managers, students, and those new to the InfoSec field. Learn about information security without wading through huge manualsCovers both theoretical and practical aspects of information securityGives a broad view of the information security field for practitioners, students, and enthusiasts

Download Link:

Related Books:

The Basics of Cyber Warfare Image

The Basics of Cyber Warfare

May 26 2017 The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging as...

The Basics of Web Hacking Image

The Basics of Web Hacking

Apr 28 2017 The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabiliti...

The InfoSec Handbook Image

The InfoSec Handbook

Apr 07 2017 The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It help...

Wireless Communications Security Image

Wireless Communications Security

Jun 22 2017 This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, operators and endusers, describes security systems attack types and the new dangers in the everevolving Internet. The book functions as a practical guide describing the evolvement of the wireless environment, and how to ensure the fluent continuum of the new functionalities, whilst minimizing the potential...

ITeBooks.directory