High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.Foundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Best selling author Jason Andress provides the basic knowledge needed to understa…
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
Foundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Best selling author Jason Andress provides the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. Each chapter explores one main security concept, lists scenarios in which the concept is applicable, and discusses the implementation of that concept in detail, often by going over rival models or strategies. Readers will come away with a sense of what types of assets need protecting, what kinds of risks exist, and what kinds of defensive measures can be taken.
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
Foundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Best selling author Jason Andress provides the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. Each chapter explores one main security concept, lists scenarios in which the concept is applicable, and discusses the implementation of that concept in detail, often by going over rival models or strategies. Readers will come away with a sense of what types of assets need protecting, what kinds of risks exist, and what kinds of defensive measures can be taken.
Reviews
No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
Price guarantee
Bookbook.eu guarantees the best price for items marked with the “Price Guarantee” badge. If an identical item costs less at another online store, we will refund the price difference. Prices are compared with the prices of items at the list of stores specified by bookbook.eu. Bookbook.eu undertakes to refund the price difference to the customer who applies under the conditions specified in the “Price Guarantee” rules. Learn more
E-book
22,39 €
ATTENTION!
This book is provided ACSM format. It is not suitable for standard reading devices that support EPUB or MOBI format e-books.
Important! It is not possible to download e-books when connecting from the United Kingdom.
This is a book being sold by a private person. After you pay for your order, the book seller will send it within 7 days . If the seller does not do this on time, the money will be refunded to you automatically.
The condition of this book has not been assessed by Bookbook.eu experts, so all responsibility for the stated book quality lies with the seller.
Would you also like to sell used books and earn money? Learn more here
Item successfully added to cart
Used book:
A used book sold directly from the Bookbook.eu warehouse. The book's quality has been assessed by Bookbook.eu experts.
Reviews