did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

Foundations of Information Security A Straightforward Introduction

9781718500044

Foundations of Information Security A Straightforward Introduction

  • ISBN 13:

    9781718500044

  • ISBN 10:

    1718500041

  • Format: Paperback
  • Copyright: 10/07/2019
  • Publisher: No Starch Press

List Price $39.95 Save

Rent $35.60
TERM PRICE DUE
Added Benefits of Renting

Free Shipping Both Ways Free Shipping Both Ways
Highlight/Take Notes Like You Own It Highlight/Take Notes Like You Own It
Purchase/Extend Before Due Date Purchase/Extend Before Due Date

List Price $39.95 Save $1.39

New $38.56

Usually Ships in 3-5 Business Days

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.

In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.

Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.

You'll also learn the basics of topics like:
  • Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process
  • The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates
  • The laws and regulations that protect systems and data
  • Anti-malware tools, firewalls, and intrusion detection systems
  • Vulnerabilities such as buffer overflows and race conditions

  • A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.

    Author Biography

    Read more