000 06551cam a2200721Ki 4500
001 ocn880706587
003 OCoLC
005 20190328114807.0
006 m o d
007 cr cnu---unuuu
008 140530s2014 mau ob 001 0 eng d
040 _aOPELS
_beng
_erda
_epn
_cOPELS
_dN$T
_dOCLCO
_dYDXCP
_dE7B
_dUMI
_dOCLCF
_dDEBBG
_dDEBSZ
_dTPH
_dUNA
_dEBLCP
_dOCLCO
_dB24X7
_dCOO
_dOCLCO
_dOCLCQ
_dOCLCO
_dVT2
_dOCLCO
_dLIV
_dMERUC
_dOCLCQ
_dIOG
_dOCLCO
_dOCLCA
_dU3W
_dD6H
_dCEF
_dOTZ
_dAU@
_dOCLCQ
_dWYU
_dCHVBK
019 _a881162098
_a883127955
_a898034970
020 _a9780128008126
_q(electronic bk.)
020 _a0128008121
_q(electronic bk.)
020 _a0128007443
020 _a9780128007440
020 _z9780128007440
035 _a(OCoLC)880706587
_z(OCoLC)881162098
_z(OCoLC)883127955
_z(OCoLC)898034970
050 4 _aQA76.9.A25
_bA5453 2014eb
060 4 _aOnline Book
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aAndress, Jason,
_eauthor.
245 1 4 _aThe basics of information security : understanding the fundamentals of InfoSec in theory and practice /
_h[electronic resource]
_cJason Andress.
250 _a2nd ed.
264 1 _aWaltham, MA :
_bSyngress,
_c2014.
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aSyngress basics series
588 0 _aOnline resource; title from PDF title page (ScienceDirect, viewed May 30, 2014).
500 _aIncludes index.
520 _aAs part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.
504 _aIncludes bibliographical references and index.
505 0 _aFront Cover; The Basics of Information Security; Copyright Page; Dedication; Contents; Author Biography; Introduction; Book overview and key learning points; Book audience; How this book is organized; Chapter 1: What is information security?; Chapter 2: Identification and authentication; Chapter 3: Authorization and access control; Chapter 4: Auditing and accountability; Chapter 5: Cryptography; Chapter 6: Laws and regulations; Chapter 7: Operations security; Chapter 8: Human element security; Chapter 9: Physical security; Chapter 10: Network security; Chapter 11: Operating system security.
505 8 _aChapter 12: Application securityConclusion; 1 What is Information Security?; Introduction; What is security?; When are we secure?; Alert!; Models for discussing security; The confidentiality, integrity, and availability triad; More advanced; Confidentiality; Integrity; Availability; Relating the CIA triad to security; The Parkerian hexad; Alert!; Confidentiality, integrity, and availability; Possession or control; Authenticity; Utility; Attacks; Types of attack payloads; Interception; Interruption; Modification; Fabrication; Threats, vulnerabilities, and risk; Threats; Vulnerabilities; Risk.
505 8 _aImpactRisk management; Identify assets; Identify threats; Assess vulnerabilities; Assess risks; Mitigating risks; Physical; Logical and technical controls; Administrative; Incident response; Preparation; Detection and analysis; Containment, eradication, and recovery; Post incident activity; Defense in depth; Layers; Information security in the real world; Summary; Exercises; References; 2 Identification and Authentication; Introduction; Identification; Who we claim to be; Identity verification; Falsifying identification; Authentication; Factors; Multifactor authentication.
505 8 _aMutual authenticationPasswords; More advanced; Biometrics; Additional resources; Characteristics; Measuring performance; Issues; Hardware tokens; Alert!; Identification and authentication in the real world; Summary; Exercises; References; 3 Authorization and Access Control; Introduction; Authorization; Principle of least privilege; Access control; More advanced; Access control lists; File system ACLs; More advanced; Network ACLs; Alert!; More advanced; Capabilities; Confused deputy problem; Alert!; Access control methodologies; Access control models; Discretionary access control.
505 8 _aMandatory access controlMore advanced; Role-based access control; Attribute-based access control; Multilevel access control; Physical access controls; Authorization and access control in the real world; Summary; Exercises; References; 4 Auditing and Accountability; Introduction; Accountability; More advanced; Security benefits of accountability; Nonrepudiation; Deterrence; More advanced; Intrusion detection and prevention; Admissibility of records; How we accomplish accountability; Auditing; What do we audit?; Alert!; Logging; Monitoring; Assessments.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aInformation technology
_xSecurity measures.
650 0 _aInformation resources management.
650 0 _aComputer science.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputer science.
_2fast
_0(OCoLC)fst00872451
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
650 7 _aInformation resources management.
_2fast
_0(OCoLC)fst00972603
650 7 _aInformation technology
_xSecurity measures.
_2fast
_0(OCoLC)fst00973129
650 1 2 _aComputer Security.
650 1 2 _aInformation Management.
655 4 _aElectronic books.
776 0 8 _iPrint version:
_z9780128007440
830 0 _aSyngress basics series.
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128007440
999 _c246917
_d246917