9781718500044-1718500041-Foundations of Information Security: A Straightforward Introduction

Foundations of Information Security: A Straightforward Introduction

FREE US shipping on ALL non-marketplace orders
Rent
35 days
from $9.21 USD
FREE shipping on RENTAL RETURNS
Marketplace
from $24.32 USD
Buy

From $24.32

Rent

From $9.21

Book details

Summary

Foundations of Information Security: A Straightforward Introduction (ISBN-13: 9781718500044 and ISBN-10: 1718500041), written by authors Jason Andress, was published by No Starch Press in 2019. With an overall rating of 3.8 stars, it's a notable title among other Management Information Systems (Business Technology, Software, Network Security, Security & Encryption, Cloud Computing, Networking & Cloud Computing, Software, Content Management, Web Development & Design, Hacking) books. You can easily purchase or rent Foundations of Information Security: A Straightforward Introduction (Paperback, Used) from BooksRun, along with many other new and used Management Information Systems books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $13.05.

Description

High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.

In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.

Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.

You'll also learn the basics of topics like:
• Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process
• The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates
• The laws and regulations that protect systems and data
• Anti-malware tools, firewalls, and intrusion detection systems
• Vulnerabilities such as buffer overflows and race conditions

A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book