E-Book, Englisch, 208 Seiten
Andress The Basics of Information Security
1. Auflage 2011
ISBN: 978-1-59749-654-4
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Understanding the Fundamentals of InfoSec in Theory and Practice
E-Book, Englisch, 208 Seiten
ISBN: 978-1-59749-654-4
Verlag: Elsevier Science & Techn.
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.
Autoren/Hrsg.
Weitere Infos & Material
1;FRONT COVER;1
2;THE BASICS OF INFORMATION SECURITY;4
3;COPYRIGHT PAGE;5
4;CONTENTS;8
5;ABOUT THE AUTHOR;10
6;ABOUT THE TECHNICAL EDITOR;12
7;FOREWORD;14
8;INTRODUCTION;16
9;CHAPTER 1 What is Information Security?;20
9.1;Introduction;20
9.2;What is security?;21
9.3;Models for discussing security issues;23
9.4;Attacks;27
9.5;Defense in depth;31
9.6;Summary;33
9.7;Exercises;34
9.8;Bibliography;35
10;CHAPTER 2 Identification and Authentication;36
10.1;Introduction;36
10.2;Identification;37
10.3;Authentication;39
10.4;Summary;48
10.5;Exercises;49
10.6;Bibliography;49
11;CHAPTER 3 Authorization and Access Control;52
11.1;Introduction;52
11.2;Authorization;53
11.3;Access control;54
11.4;Access control methodologies;61
11.5;Summary;66
11.6;Exercises;67
11.7;Bibliography;67
12;CHAPTER 4 Auditing and Accountability;70
12.1;Introduction;70
12.2;Accountability;71
12.3;Auditing;74
12.4;Summary;79
12.5;Exercises;80
12.6;Bibliography;80
13;CHAPTER 5 Cryptography;82
13.1;Introduction;82
13.2;History;83
13.3;Modern cryptographic tools;88
13.4;Protecting data at rest, in motion, and in use;93
13.5;Summary;98
13.6;Exercises;99
13.7;Bibliography;99
14;CHAPTER 6 Operations Security;100
14.1;Introduction;100
14.2;Origins of operations security;101
14.3;The operations security process;104
14.4;Laws of operations security;108
14.5;Operations security in our personal lives;110
14.6;Summary;112
14.7;Exercises;113
14.8;Bibliography;113
15;CHAPTER 7 Physical Security;116
15.1;Introduction;116
15.2;Physical security controls;118
15.3;Protecting people;120
15.4;Protecting data;124
15.5;Protecting equipment;127
15.6;Summary;131
15.7;Exercises;132
15.8;Bibliography;133
16;CHAPTER 8 Network Security;134
16.1;Introduction;134
16.2;Protecting networks;135
16.3;Protecting network traffic;140
16.4;Network security tools;143
16.5;Summary;148
16.6;Exercises;148
16.7;Bibliography;148
17;CHAPTER 9 Operating System Security;150
17.1;Introduction;150
17.2;Operating system hardening;151
17.3;Protecting against malware;156
17.4;Software firewalls and host intrusion detection;158
17.5;Operating system security tools;159
17.6;Summary;163
17.7;Exercises;163
17.8;Bibliography;164
18;CHAPTER 10 Application Security;166
18.1;Introduction;166
18.2;Software development vulnerabilities;167
18.3;Web security;171
18.4;Database security;174
18.5;Application security tools;178
18.6;Summary;183
18.7;Exercises;184
18.8;Bibliography;184
19;INDEX;186




