The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, Second Edition
- 4h 23m
- Jason Andress
- Elsevier Science and Technology Books, Inc.
- 2014
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.
- Learn about information security without wading through a huge textbook
- Covers both theoretical and practical aspects of information security
- Provides a broad view of the information security field in a concise manner
- All-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues
About the Author
Jason Andress (ISSAP, CISSP, GPEN, CEH) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.
In this Book
-
Introduction
-
Chapter 1: What is Information Security?
-
Chapter 2: Identification and Authentication
-
Chapter 3: Authorization and Access Control
-
Chapter 4: Auditing and Accountability
-
Chapter 5: Cryptography
-
Chapter 6: Laws and Regulations
-
Chapter 7: Operations Security
-
Chapter 8: Human Element Security
-
Chapter 9: Physical Security
-
Chapter 10: Network Security
-
Chapter 11: Operating System Security
-
Chapter 12: Application Security