ebook img

Foundations of Information Security: A Straightforward Introduction PDF

250 Pages·2019·17.406 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Foundations of Information Security: A Straightforward Introduction

F Begin your journey into the o Foundations of u n d dynamic and rewarding field of a t i o Information Security n information security s o f I n f o A Straightforward Introduction r In this survey of the information-security fun- 🐉 The laws and regulations that protect sys- m damentals, best-selling author Jason Andress tems and data a covers the basics of a wide variety of topics, t 🐉 Anti-malware tools, firewalls, and intrusion i from authentication and authorization to o maintaining confidentiality and performing detection systems n penetration testing. 🐉 Vulnerabilities such as buffer overflows S and race conditions e Using real-world security breaches as c examples, Foundations of Information u A valuable resource for beginning security Security explores operations security, net- r professionals, network systems administra- i work design, operating system hardening t tors, or anyone new to the field, Foundations y and patching, and mobile device security, of Information Security is a great place to start as well as tools for assessing the security of your journey into the dynamic and rewarding hosts and applications. study of information security. A S You’ll also learn the basics of: t r a About the Author i 🐉 Multifactor authentication and how bio- g h metrics and hardware tokens can be used t f to harden the authentication process Dr. Jason Andress is a seasoned security profes- or sional, security researcher, and technophile. w a 🐉 The principles behind modern crypto- He has been writing about security topics for r d graphy, including symmetric and asym- over a decade, including data security, network I n metric algorithms, hashes, and certificates security, hardware security, penetration test- t r o ing, and digital forensics, among others. d u c t i o n A n THE FINEST IN GEEK ENTERTAINMENT™ d www.nostarch.com r Price: $39.95 ($53.95 CDN) e s Shelve In: COMPUTERS/SECURITY s Jason Andress FOUNDATIONS OF INFORMATION SECURITY F O U N D A T I O N S O F I N F O R M A T I O N S E C U R I T Y A Straightforward Introduction by Jason Andress San Francisco FOUNDATIONS OF INFORMATION SECURITY. Copyright © 2019 by Jason Andress. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. ISBN-10: 1-7185-0004-1 ISBN-13: 978-1-7185-0004-4 Publisher: William Pollock Production Editor: Meg Sneeringer Cover Illustration: Rick Reese Developmental Editor: Frances Saux Technical Reviewer: Cliff Janzen Copyeditor: Kim Wimpsett Compositor: Meg Sneeringer Proofreader: James Fraleigh Indexer: Beth Nauman-Montana For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 245 8th Street, San Francisco, CA 94103 phone: 1.415.863.9900; [email protected] www.nostarch.com The Library of Congress issued the following Cataloging-in-Publication Data for the first edition: Names: Andress, Jason, author. Title: Foundations of information security: a straightforward introduction / Jason Andress. Description: 1st ed. | San Francisco : No Starch Press, 2019. | Includes bibliographical references and index. | Summary: "Begins with an introduction to information security, including key topics such as confidentiality, integrity, and availability, and then moves on to practical applications of these ideas in the areas of operational, physical, network, application, and operating system security"-- Provided by publisher. Identifiers: LCCN 2019024099 (print) | LCCN 2019024100 (ebook) | ISBN 9781718500044 (paperback) | ISBN 1718500041 (paperback) | ISBN 9781718500051 (ebook) Subjects: LCSH: Computer security. | Computer networks--Security measures. | Electronic information resources--Access control. Classification: LCC QA76.9.A25 A5445 2019 (print) | LCC QA76.9.A25 (ebook) | DDC 005.8--dc23 LC record available at https://lccn.loc.gov/2019024099 LC ebook record available at https://lccn.loc.gov/2019024100 No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it. Le meglio è l’inimico del bene. —Voltaire About the Author Dr. Jason Andress is a seasoned security professional, security researcher, and technophile. He has been writing on security topics for over a decade, covering data security, network security, hardware security, penetration testing, and digital forensics, among others. About the Technical Reviewer Since the early days of Commodore PET and VIC-20, technology has been a constant companion (and sometimes an obsession!) to Cliff. He discovered his career passion when he moved into information security in 2008 after a decade of IT operations. Since that time, Cliff is grateful to have had the opportunity to work with and learn from some of the best people in the industry including Jason and the fine people at No Starch. Cliff spends a majority of the work day managing and mentoring a great team, but strives to stay technically relevant by tackling everything from security policy reviews to penetration testing. He feels lucky to have a career that is also his favourite hobby and a wife that supports him.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.