| 000 | 00000cam u2200205 a 4500 | |
| 001 | 000046107759 | |
| 005 | 20220208134322 | |
| 008 | 220208s2019 caua b 001 0 eng | |
| 010 | ▼a 2019024099 | |
| 020 | ▼a 9781718500044 (paperback) | |
| 020 | ▼a 1718500041 (paperback) | |
| 020 | ▼a 9781718500051 (ebook) | |
| 035 | ▼a (KERIS)REF000019571450 | |
| 040 | ▼a DLC ▼b eng ▼c DLC ▼e rda ▼d DLC ▼d 211009 | |
| 042 | ▼a pcc | |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b A5445 2019 |
| 082 | 0 0 | ▼a 005.8 ▼2 23 |
| 084 | ▼a 005.8 ▼2 DDCK | |
| 090 | ▼a 005.8 ▼b A561f | |
| 100 | 1 | ▼a Andress, Jason, ▼e author. |
| 245 | 1 0 | ▼a Foundations of information security : ▼b a straightforward introduction / ▼c by Jason Andress. |
| 260 | ▼a San Francisco : ▼b No Starch Press, ▼c 2019. | |
| 264 | 1 | ▼a San Francisco : ▼b No Starch Press, ▼c [2019] |
| 300 | ▼a xxi, 222 p. : ▼b ill. ; ▼c 24 cm. | |
| 336 | ▼a text ▼b txt ▼2 rdacontent | |
| 337 | ▼a unmediated ▼b n ▼2 rdamedia | |
| 338 | ▼a volume ▼b nc ▼2 rdacarrier | |
| 504 | ▼a Includes bibliographical references and index. | |
| 520 | ▼a "Begins with an introduction to information security, including key topics such as confidentiality, integrity, and availability, and then moves on to practical applications of these ideas in the areas of operational, physical, network, application, and operating system security"-- ▼c Provided by publisher. | |
| 650 | 0 | ▼a Computer security. |
| 650 | 0 | ▼a Computer networks ▼x Security measures. |
| 650 | 0 | ▼a Electronic information resources ▼x Access control. |
| 945 | ▼a KLPA |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 A561f | 등록번호 121258993 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.
Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.
You'll also learn the basics of topics like:
A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
Reviews
“This book is an excellent starting point for future security professionals but also network and system administrators.”—Help Net Security
"A thorough overview for many different areas within security. The author explains what and more importantly why, then illustrates each concept with concrete, realistic examples. Definitely a great addition to any security engineer's library, but also less technical people who want to learn more about common topics like defense in depth."
—Seth Foley
"If you’re new to info security or are looking to refresh your knowledge, then this is an ideal book. It’s easy to read and makes the information fun to consume."
—HaXez, Blogger and YouTuber
About the Author
Dr. Jason Andress is a seasoned security professional, security researcher, and technophile. He has been writing on security topics for over a decade, covering data security, network security, hardware security, penetration testing, and digital forensics, among others.정보제공 :
목차
Introduction Chapter 1: What is Information Security? Chapter 2: Indentification and Authentication Chapter 3: Authorization and Access Control Chapter 4: Auditing and Accountability Chapter 5: Cryptography Chapter 6: Compliance, Laws, and Regulations Chapter 7: Operations Security Chapter 8: Human Element Security Chapter 9: Physical Security Chapter 10: Network Security Chapter 11: Operating System Security Chapter 12: Mobile, Embedded, and Internet of Things Security Chapter 13: Application Security Chapter 14: Assessing Security Notes
