Book description
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.
Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.
You’ll also learn the basics of topics like:
•Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process
•The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates
•The laws and regulations that protect systems and data
•Anti-malware tools, firewalls, and intrusion detection systems
•Vulnerabilities such as buffer overflows and race conditions
A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication
- About the Author
- About the Technical Reviewer
- CONTENTS IN DETAIL
- ACKNOWLEDGMENTS
- INTRODUCTION
- 1 WHAT IS INFORMATION SECURITY?
- 2 IDENTIFICATION AND AUTHENTICATION
- 3 AUTHORIZATION AND ACCESS CONTROLS
- 4 AUDITING AND ACCOUNTABILITY
- 5 CRYPTOGRAPHY
- 6 COMPLIANCE, LAWS, AND REGULATIONS
- 7 OPERATIONS SECURITY
- 8 HUMAN ELEMENT SECURITY
- 9 PHYSICAL SECURITY
- 10 NETWORK SECURITY
- 11 OPERATING SYSTEM SECURITY
- 12 MOBILE, EMBEDDED, AND INTERNET OF THINGS SECURITY
- 13 APPLICATION SECURITY
- 14 ASSESSING SECURITY
- NOTES
- INDEX
Product information
- Title: Foundations of Information Security
- Author(s):
- Release date: October 2019
- Publisher(s): No Starch Press
- ISBN: 9781718500044
You might also like
book
CISM Certified Information Security Manager Study Guide
Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide …
book
Security in Computing
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of …
book
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge ISC2 Certified Information …
audiobook
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated …