The basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress, Steven Winterfeld, technical editor.
Material type: TextPublisher: Amsterdam ; Boston : Elsevier/Syngress, Syngress is a imprint of Elsevier, [2014]Edition: Second editionDescription: xxi, 217 pages ; 24 cmContent type:- text
- unmediated
- volume
- 9780128007440
- 005.8 23
- QA76.9.A25 A5453 2014
Item type | Current library | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book | University Library Regular Circulation | Circulating | QA76.9 A25 A5453 2014 (Browse shelf(Opens below)) | Available | 3UPML00028299 |
Browsing College of Science and Mathematics shelves, Shelving location: Regular Circulation, Collection: Circulating Close shelf browser (Hides shelf browser)
QA76.8 I2594 A23 1995 IBM PC assembly language and programming | QA76.8.I2594 A236 1998 IBM PC assembly language and programming / | QA76.8.I64 M37 2009 Beginning iPhone 3 development : exploring the iPhone SDK / | QA76.9 A25 A5453 2014 The basics of information security : understanding the fundamentals of InfoSec in theory and practice / | QA76.9 A25 C66 1995 Computers, ethics & social values / | QA76.9 A25 C66 1995 Computers, ethics & social values / | QA76.9.A25 K345 1995 Network security : private communication in a public world / |
Donated by UP Alumni Association of Central California (UPAACC)
"The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book will provide a valuable resource to beginning security professionals, as well as to network and systems administrators. The information provided on can be used develop a better understanding on how we protect our information assets and defend against attacks, as well as how to apply these concepts practically"-- Provided by publisher.
There are no comments on this title.