000 | 06551cam a2200721Ki 4500 | ||
---|---|---|---|
001 | ocn880706587 | ||
003 | OCoLC | ||
005 | 20190328114807.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140530s2014 mau ob 001 0 eng d | ||
040 |
_aOPELS _beng _erda _epn _cOPELS _dN$T _dOCLCO _dYDXCP _dE7B _dUMI _dOCLCF _dDEBBG _dDEBSZ _dTPH _dUNA _dEBLCP _dOCLCO _dB24X7 _dCOO _dOCLCO _dOCLCQ _dOCLCO _dVT2 _dOCLCO _dLIV _dMERUC _dOCLCQ _dIOG _dOCLCO _dOCLCA _dU3W _dD6H _dCEF _dOTZ _dAU@ _dOCLCQ _dWYU _dCHVBK |
||
019 |
_a881162098 _a883127955 _a898034970 |
||
020 |
_a9780128008126 _q(electronic bk.) |
||
020 |
_a0128008121 _q(electronic bk.) |
||
020 | _a0128007443 | ||
020 | _a9780128007440 | ||
020 | _z9780128007440 | ||
035 |
_a(OCoLC)880706587 _z(OCoLC)881162098 _z(OCoLC)883127955 _z(OCoLC)898034970 |
||
050 | 4 |
_aQA76.9.A25 _bA5453 2014eb |
|
060 | 4 | _aOnline Book | |
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aAndress, Jason, _eauthor. |
|
245 | 1 | 4 |
_aThe basics of information security : understanding the fundamentals of InfoSec in theory and practice / _h[electronic resource] _cJason Andress. |
250 | _a2nd ed. | ||
264 | 1 |
_aWaltham, MA : _bSyngress, _c2014. |
|
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aSyngress basics series | |
588 | 0 | _aOnline resource; title from PDF title page (ScienceDirect, viewed May 30, 2014). | |
500 | _aIncludes index. | ||
520 | _aAs part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects. | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aFront Cover; The Basics of Information Security; Copyright Page; Dedication; Contents; Author Biography; Introduction; Book overview and key learning points; Book audience; How this book is organized; Chapter 1: What is information security?; Chapter 2: Identification and authentication; Chapter 3: Authorization and access control; Chapter 4: Auditing and accountability; Chapter 5: Cryptography; Chapter 6: Laws and regulations; Chapter 7: Operations security; Chapter 8: Human element security; Chapter 9: Physical security; Chapter 10: Network security; Chapter 11: Operating system security. | |
505 | 8 | _aChapter 12: Application securityConclusion; 1 What is Information Security?; Introduction; What is security?; When are we secure?; Alert!; Models for discussing security; The confidentiality, integrity, and availability triad; More advanced; Confidentiality; Integrity; Availability; Relating the CIA triad to security; The Parkerian hexad; Alert!; Confidentiality, integrity, and availability; Possession or control; Authenticity; Utility; Attacks; Types of attack payloads; Interception; Interruption; Modification; Fabrication; Threats, vulnerabilities, and risk; Threats; Vulnerabilities; Risk. | |
505 | 8 | _aImpactRisk management; Identify assets; Identify threats; Assess vulnerabilities; Assess risks; Mitigating risks; Physical; Logical and technical controls; Administrative; Incident response; Preparation; Detection and analysis; Containment, eradication, and recovery; Post incident activity; Defense in depth; Layers; Information security in the real world; Summary; Exercises; References; 2 Identification and Authentication; Introduction; Identification; Who we claim to be; Identity verification; Falsifying identification; Authentication; Factors; Multifactor authentication. | |
505 | 8 | _aMutual authenticationPasswords; More advanced; Biometrics; Additional resources; Characteristics; Measuring performance; Issues; Hardware tokens; Alert!; Identification and authentication in the real world; Summary; Exercises; References; 3 Authorization and Access Control; Introduction; Authorization; Principle of least privilege; Access control; More advanced; Access control lists; File system ACLs; More advanced; Network ACLs; Alert!; More advanced; Capabilities; Confused deputy problem; Alert!; Access control methodologies; Access control models; Discretionary access control. | |
505 | 8 | _aMandatory access controlMore advanced; Role-based access control; Attribute-based access control; Multilevel access control; Physical access controls; Authorization and access control in the real world; Summary; Exercises; References; 4 Auditing and Accountability; Introduction; Accountability; More advanced; Security benefits of accountability; Nonrepudiation; Deterrence; More advanced; Intrusion detection and prevention; Admissibility of records; How we accomplish accountability; Auditing; What do we audit?; Alert!; Logging; Monitoring; Assessments. | |
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aInformation technology _xSecurity measures. |
|
650 | 0 | _aInformation resources management. | |
650 | 0 | _aComputer science. | |
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer science. _2fast _0(OCoLC)fst00872451 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aInformation resources management. _2fast _0(OCoLC)fst00972603 |
|
650 | 7 |
_aInformation technology _xSecurity measures. _2fast _0(OCoLC)fst00973129 |
|
650 | 1 | 2 | _aComputer Security. |
650 | 1 | 2 | _aInformation Management. |
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _z9780128007440 |
830 | 0 | _aSyngress basics series. | |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128007440 |
999 |
_c246917 _d246917 |