Home Page Icon
Home Page
Table of Contents for
Cover image
Close
Cover image
by Jason Andress
The Basics of Information Security, 2nd Edition
Cover image
Title page
Copyright
Dedication
Author Biography
Introduction
Book overview and key learning points
Book audience
How this book is organized
Conclusion
Chapter 1. What is Information Security?
Introduction
What is security?
Alert!
Models for discussing security
More advanced
Alert!
Attacks
Defense in depth
Information security in the real world
Summary
Exercises
References
Chapter 2. Identification and Authentication
Introduction
Identification
Authentication
More advanced
Additional resources
Alert!
Identification and authentication in the real world
Summary
Exercises
References
Chapter 3. Authorization and Access Control
Introduction
Authorization
Access control
More advanced
More advanced
Alert!
More advanced
Alert!
Access control methodologies
More advanced
Authorization and access control in the real world
Summary
Exercises
References
Chapter 4. Auditing and Accountability
Introduction
Accountability
More advanced
Auditing
Alert!
Accountability and auditing in the real world
More advanced
Summary
Exercises
References
Chapter 5. Cryptography
Introduction
History
More advanced
Additional resources
Modern cryptographic tools
More advanced
Protecting data at rest, in motion, and in use
Alert!
Cryptography in the real world
Summary
Exercises
References
Chapter 6. Laws and Regulations
Introduction
Laws and regulations
Compliance
Privacy
Summary
Questions
References
Chapter 7. Operations Security
Introduction
Alert!
Origins of operations security
Additional resources
The operations security process
Haas’ Laws of operations security
More advanced
Operations security in our personal lives
Alert!
Operations security in the real world
Summary
Exercises
References
Chapter 8. Human Element Security
Introduction
Humans: the weak link
Security awareness
The security awareness and training program
Summary
Exercises
References
Chapter 9. Physical Security
Introduction
Alert!
Additional resources
Physical security controls
Protecting people
Protecting data
More advanced
Protecting equipment
Note
Physical security in the real world
Summary
Exercises
References
Chapter 10. Network Security
Introduction
Protecting networks
Protecting network traffic
Mobile device security
Network security tools
More advanced
Additional resources
Network security in the real world
Summary
Exercises
References
Chapter 11. Operating System Security
Introduction
Operating system hardening
Protecting against malware
Additional resources
More advanced
Software firewalls and host intrusion detection
Operating system security tools
Alert!
Operating system security in the real world
Summary
Exercises
References
Chapter 12. Application Security
Introduction
The TJX breach
Software development vulnerabilities
Additional resources
Web security
Alert!
More advanced
Database security
Additional resources
Application security tools
More advanced
Application security in the real world
Summary
Exercises
References
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset