• Complain

Andress - Foundations of Information Security

Here you can read online Andress - Foundations of Information Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2019, publisher: No Starch Press, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Foundations of Information Security
  • Author:
  • Publisher:
    No Starch Press
  • Genre:
  • Year:
    2019
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Foundations of Information Security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Foundations of Information Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.
Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.
Youll also learn the basics of topics like:
* Multifactor authentication and how biometrics and hardware tokens can be used...

Andress: author's other books


Who wrote Foundations of Information Security? Find out the surname, the name of the author of the book and a list of all author's works by series.

Foundations of Information Security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Foundations of Information Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents in Detail
Foundations of Information Security - image 1
FOUNDATIONS OF INFORMATION SECURITY

A Straightforward Introduction

by Jason Andress

Foundations of Information Security - image 2

San Francisco

FOUNDATIONS OF INFORMATION SECURITY. Copyright 2019 by Jason Andress.

All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher.

ISBN-10: 1-7185-0004-1
ISBN-13: 978-1-7185-0004-4

Publisher: William Pollock
Production Editor: Meg Sneeringer
Cover Illustration: Rick Reese
Developmental Editor: Frances Saux
Technical Reviewer: Cliff Janzen
Copyeditor: Kim Wimpsett
Compositor: Meg Sneeringer
Proofreader: James Fraleigh
Indexer: Beth Nauman-Montana

For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly:
No Starch Press, Inc.
245 8th Street, San Francisco, CA 94103
phone: 1.415.863.9900;
www.nostarch.com

The Library of Congress issued the following Cataloging-in-Publication Data for the first edition:

Names: Andress, Jason, author.

Title: Foundations of information security: a straightforward introduction / Jason Andress.

Description: 1st ed. | San Francisco : No Starch Press, 2019. | Includes
bibliographical references and index. | Summary: "Begins with an
introduction to information security, including key topics such as
confidentiality, integrity, and availability, and then moves on to
practical applications of these ideas in the areas of operational,
physical, network, application, and operating system security"-
Provided by publisher.

Identifiers: LCCN 2019024099 (print) | LCCN 2019024100 (ebook) | ISBN
9781718500044 (paperback) | ISBN 1718500041 (paperback) | ISBN
9781718500051 (ebook)

Subjects: LCSH: Computer security. | Computer networks--Security measures.
| Electronic information resources--Access control.

Classification: LCC QA76.9.A25 A5445 2019 (print) | LCC QA76.9.A25
(ebook) | DDC 005.8--dc23

LC record available at https://lccn.loc.gov/2019024099

LC ebook record available at https://lccn.loc.gov/2019024100

No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.

The information in this book is distributed on an As Is basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.

Le meglio linimico del bene.

Voltaire

About the Author

Dr. Jason Andress is a seasoned security professional, security researcher, and technophile. He has been writing on security topics for over a decade, covering data security, network security, hardware security, penetration testing, and digital forensics, among others.

About the Technical Reviewer

Since the early days of Commodore PET and VIC-20, technology has been a constant companion (and sometimes an obsession!) to Cliff. He discovered his career passion when he moved into information security in 2008 after a decade of IT operations. Since that time, Cliff is grateful to have had the opportunity to work with and learn from some of the best people in the industry including Jason and the fine people at No Starch. Cliff spends a majority of the work day managing and mentoring a great team, but strives to stay technically relevant by tackling everything from security policy reviews to penetration testing. He feels lucky to have a career that is also his favourite hobby and a wife that supports him.

CONTENTS IN DETAIL

1
WHAT IS INFORMATION SECURITY?

2
IDENTIFICATION AND AUTHENTICATION

3
AUTHORIZATION AND ACCESS CONTROLS

4
AUDITING AND ACCOUNTABILITY

5
CRYPTOGRAPHY

6
COMPLIANCE, LAWS, AND REGULATIONS

7
OPERATIONS SECURITY

8
HUMAN ELEMENT SECURITY

9
PHYSICAL SECURITY

10
NETWORK SECURITY

11
OPERATING SYSTEM SECURITY

12
MOBILE, EMBEDDED, AND INTERNET OF THINGS SECURITY

13
APPLICATION SECURITY

14
ASSESSING SECURITY

ACKNOWLEDGMENTS

I want to thank my wife for bearing with me through another writing project, especially during my excessive complaining and foot dragging over (ahem) certain chapters <3.

I also want to thank the whole crew at No Starch Press for all their time and hard work in making this a better book. Without all the many rounds of editing, reviewing, and feedback, this book would have been a considerably less polished version of itself.

INTRODUCTION
When I was in school I was faced with a choice between pursuing a - photo 3

When I was in school, I was faced with a choice between pursuing a concentration in either information security or software engineering. The software engineering courses had terribly boring-sounding titles, so information security it was. Little did I know what a twisted and winding path Id embarked on.

Information security as a career can take you many different places. Over the years, Ive dealt with large-scale malware outbreaks, collected forensic information for court cases, hunted for foreign hackers in computer systems, hacked into systems and applications (with permission!), pored over an astonishing amount of log data, implemented and maintained all manner of security tooling, authored many thousands of lines of code to fit square pegs into round holes, worked on open source projects, spoken at security conferences, taught classes, and written somewhere into the upper regions of hundreds of thousands of words on the topic of security.

This book surveys the information security field as a whole. Its well-suited to anyone wondering what people mean when they use the term information securityor anyone interested in the field and wondering where to start. The chapters offer clear, nontechnical explanations of how information security works and how to apply these principles to your own career. It should help you learn about information security without making you consult a massive textbook. Ill first cover the fundamental ideas, such as authentication and authorization, needed to understand the fields key concepts, such as the principle of least privilege and various security models. Ill then dive into a survey of real-world applications of these ideas in the areas of operations, human, physical, network, operating system, mobile, embedded, Internet of Things (IoT), and application security. Ill finish up by looking at how to assess security.

Who Should Read This Book?

This book will be a valuable resource to beginning security professionals, as well as to network and system administrators. You should use the information provided to develop a better understanding of how you protect your information assets and defend against attacks, as well as how to apply these concepts systematically to make your environment more secure.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Foundations of Information Security»

Look at similar books to Foundations of Information Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Foundations of Information Security»

Discussion, reviews of the book Foundations of Information Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.