Description
Book Synopsis: High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.
Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. You'll also learn the basics of topics like:
- Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process
- The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates
- The laws and regulations that protect systems and data
- Anti-malware tools, firewalls, and intrusion detection systems
- Vulnerabilities such as buffer overflows and race conditions
A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
Details
Looking to start a career in information security? Look no further! Foundations of Information Security: A Straightforward Introduction is the ultimate guide to help you navigate the complex world of information security. Written by best-selling author Jason Andress, this high-level overview covers everything you need to know, from the basics of confidentiality, integrity, and availability, to practical applications in operational, physical, network, application, and operating system security.
With real-world examples and case studies, Foundations of Information Security takes you on a journey through the most important concepts and practices in the field. You'll learn about authentication and authorization, maintaining confidentiality, and even performing penetration testing. Gain in-depth knowledge about operations security, network design, and securing mobile devices. Plus, discover the must-have tools for assessing the security of hosts and applications.
But that's not all! Foundations of Information Security goes beyond the surface, diving into the principles of modern cryptography, the laws and regulations protecting systems and data, and the latest anti-malware tools, firewalls, and intrusion detection systems. You'll also explore vulnerabilities like buffer overflows and race conditions, giving you a comprehensive understanding of the potential risks and how to mitigate them.
Whether you're a beginner seeking to enter the world of information security or a network systems administrator looking to enhance your skills, Foundations of Information Security is the perfect resource. Start your journey into this dynamic and rewarding field today!
Ready to become an information security expert? Get your copy of Foundations of Information Security: A Straightforward Introduction now and unlock the secrets to a successful career in this thriving industry.
Discover More Best Sellers in Security & Encryption
Shop Security & Encryption
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Security & Encryption - The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology
Security & Encryption - Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology
CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 (Sybex Study Guide)
Security & Encryption - CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 (Sybex Study Guide)
How to Measure Anything in Cybersecurity Risk
Security & Encryption - How to Measure Anything in Cybersecurity Risk
Security & Encryption - CompTIA A+ Complete Certification Kit: Core 1 Exam 220-1201 and Core 2 Exam 220-1202 (Sybex Study Guide)
Mastering the Lightning Network: A Second Layer Blockchain Protocol for Instant Bitcoin Payments
Security & Encryption - Mastering the Lightning Network: A Second Layer Blockchain Protocol for Instant Bitcoin Payments
Security & Encryption - Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization



