• Complain

Jason Andress - Foundations of Information Security: A Straightforward Introduction

Here you can read online Jason Andress - Foundations of Information Security: A Straightforward Introduction full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: San Francisco, CA, year: 2019, publisher: No Starch Press, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Foundations of Information Security: A Straightforward Introduction
  • Author:
  • Publisher:
    No Starch Press
  • Genre:
  • Year:
    2019
  • City:
    San Francisco, CA
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Foundations of Information Security: A Straightforward Introduction: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Foundations of Information Security: A Straightforward Introduction" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. Youll also learn the basics of topics like: Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates The laws and regulations that protect systems and data Anti-malware tools, firewalls, and intrusion detection systems Vulnerabilities such as buffer overflows and race conditionsA valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.

Jason Andress: author's other books


Who wrote Foundations of Information Security: A Straightforward Introduction? Find out the surname, the name of the author of the book and a list of all author's works by series.

Foundations of Information Security: A Straightforward Introduction — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Foundations of Information Security: A Straightforward Introduction" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Foundations of Information Security A Straightforward Introduction - image 1
Contents in Detail
FOUNDATIONS OF INFORMATION SECURITY

A Straightforward Introduction

by Jason Andress

Foundations of Information Security A Straightforward Introduction - image 2

San Francisco

FOUNDATIONS OF INFORMATION SECURITY. Copyright 2019 by Jason Andress.

All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher.

ISBN-10: 1-7185-0004-1ISBN-13: 978-1-7185-0004-4

Publisher: William PollockProduction Editor: Meg SneeringerCover Illustration: Rick ReeseDevelopmental Editor: Frances SauxTechnical Reviewer: Cliff JanzenCopyeditor: Kim WimpsettCompositor: Meg SneeringerProofreader: James FraleighIndexer: Beth Nauman-Montana

For information on distribution, translations, or bulk sales, please contact ...

Le meglio linimico del bene.

Voltaire

About the Author

Dr. Jason Andress is a seasoned security professional, security researcher, and technophile. He has been writing on security topics for over a decade, covering data security, network security, hardware security, penetration testing, and digital forensics, among others.

About the Technical Reviewer

Since the early days of Commodore PET and VIC-20, technology has been a constant companion (and sometimes an obsession!) to Cliff. He discovered his career passion when he moved into information security in 2008 after a decade of IT operations. Since that time, Cliff is grateful to have had the opportunity to work with and learn from some of the best people in the industry including Jason and the fine people at No Starch. Cliff spends a majority of the work day managing and mentoring a great team, but strives to stay technically relevant by tackling everything from security policy reviews to penetration testing. He feels lucky to have a career that is also his favourite hobby and a wife that supports him.

CONTENTS IN DETAIL

1
WHAT IS INFORMATION SECURITY?

2
IDENTIFICATION AND AUTHENTICATION

3
AUTHORIZATION AND ACCESS CONTROLS

4
AUDITING AND ACCOUNTABILITY

5
CRYPTOGRAPHY

6
COMPLIANCE, LAWS, AND REGULATIONS

7
OPERATIONS SECURITY

8
HUMAN ELEMENT SECURITY

9
PHYSICAL SECURITY

10
NETWORK SECURITY

11
OPERATING SYSTEM SECURITY

12
MOBILE, EMBEDDED, AND INTERNET OF THINGS SECURITY

13
APPLICATION SECURITY

14
ASSESSING SECURITY

ACKNOWLEDGMENTS

I want to thank my wife for bearing with me through another writing project, especially during my excessive complaining and foot dragging over (ahem) certain chapters <3.

I also want to thank the whole crew at No Starch Press for all their time and hard work in making this a better book. Without all the many rounds of editing, reviewing, and feedback, this book would have been a considerably less polished version of itself.

INTRODUCTION
When I was in school I was faced with a choice between pursuing a - photo 3

When I was in school, I was faced with a choice between pursuing a concentration in either information security or software engineering. The software engineering courses had terribly boring-sounding titles, so information security it was. Little did I know what a twisted and winding path Id embarked on.

Information security as a career can take you many different places. Over the years, Ive dealt with large-scale malware outbreaks, collected forensic information for court cases, hunted for foreign hackers in computer systems, hacked into systems and applications (with permission!), pored over an astonishing amount of log data, implemented and maintained all manner of security tooling, authored many thousands of lines of code to fit square pegs into round holes, worked on open source projects, spoken at security conferences, taught classes, and written somewhere into the upper regions of hundreds of thousands of words on the topic of security.

This book surveys the information security field as a whole. Its well-suited to anyone wondering what people mean when they use the term information securityor anyone interested in the field and wondering where to start. The chapters offer clear, nontechnical explanations of how information security works and how to apply these principles to your own career. It should help you learn about information security without making you consult a massive textbook. Ill first cover the fundamental ideas, such as authentication and authorization, needed to understand the fields key concepts, such as the principle of least privilege and various security models. Ill then dive into a survey of real-world applications of these ideas in the areas of operations, human, physical, network, operating system, mobile, embedded, Internet of Things (IoT), and application security. Ill finish up by looking at how to assess security.

Who Should Read This Book?

This book will be a valuable resource to beginning security professionals, as well as to network and system administrators. You should use the information provided to develop a better understanding of how you protect your information assets and defend against attacks, as well as how to apply these concepts systematically to make your environment more secure.

Those in management positions will find this information useful as well, because it should help you develop better overall security practices for your organizations. The concepts discussed in this book can be used to drive security projects and policies and to mitigate some of the issues discussed.

About This Book

This book is designed to take you through a foundational understanding of information security from the ground up, so its best read from start to finish. Throughout the book you will see numbered references to the Notes section at the end of the book, where you can find more information on some of these topics. Heres what youll find in each chapter:

Introduces some of the most basic concepts of information security, such as the confidentiality, integrity, and availability triad; basic concepts of risk; and controls to mitigate it.

Covers the security principles of identification and authentication.

Discusses the use of authorization and access controls, which are means of determining who or what can access your resources.

Explains the use of auditing and accountability for making sure youre aware of what people are doing in your environment.

Covers the use of cryptography for protecting the confidentiality of your data.

Outlines the laws and regulations relevant to information security and what it means to comply with them.

Covers operations security, which is the process you use to protect your information.

Explores issues pertaining to the human element of information security, such as the tools and techniques that attackers use to con us and how to defend against them.

Discusses the physical aspects of information security.

Examines how you might protect your networks from a variety of different angles, such as network design, security devices, and security tooling.

Explores the strategies you can use for securing the operating system, such as hardening and patching, and the steps that you can take to do so.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Foundations of Information Security: A Straightforward Introduction»

Look at similar books to Foundations of Information Security: A Straightforward Introduction. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Foundations of Information Security: A Straightforward Introduction»

Discussion, reviews of the book Foundations of Information Security: A Straightforward Introduction and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.