Information Security The Complete Reference, Second Edition
Title | Information Security The Complete Reference, Second Edition PDF eBook |
Author | Mark Rhodes-Ousley |
Publisher | McGraw Hill Professional |
Pages | 898 |
Release | 2013-04-03 |
Genre | Computers |
ISBN | 0071784357 |
Develop and implement an effective end-to-end security program Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security—from concepts to details—this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional. Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You’ll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike. Understand security concepts and building blocks Identify vulnerabilities and mitigate risk Optimize authentication and authorization Use IRM and encryption to protect unstructured data Defend storage devices, databases, and software Protect network routers, switches, and firewalls Secure VPN, wireless, VoIP, and PBX infrastructure Design intrusion detection and prevention systems Develop secure Windows, Java, and mobile applications Perform incident response and forensic analysis
The Basics of Information Security
Title | The Basics of Information Security PDF eBook |
Author | Jason Andress |
Publisher | Syngress |
Pages | 240 |
Release | 2014-05-20 |
Genre | Computers |
ISBN | 0128008121 |
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects. Learn about information security without wading through a huge textbook Covers both theoretical and practical aspects of information security Provides a broad view of the information security field in a concise manner All-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues
The Complete Reference
Title | The Complete Reference PDF eBook |
Author | Mark Rhodes-Ousley |
Publisher | |
Pages | 896 |
Release | 2013 |
Genre | Computer security |
ISBN |
Explaining how to build a holistic security program based on proven methodology; risk analysis; compliance; and business needs; this comprehensive book offers vendor-neutral details on all aspects of information protection; with an eye toward the evolving threat landscape. --
Information Security Policies and Procedures
Title | Information Security Policies and Procedures PDF eBook |
Author | Thomas R. Peltier |
Publisher | CRC Press |
Pages | 408 |
Release | 2004-06-11 |
Genre | Business & Economics |
ISBN | 0203488733 |
Information Security Policies and Procedures: A Practitioner‘s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how securi
Computer and Information Security Handbook
Title | Computer and Information Security Handbook PDF eBook |
Author | John R. Vacca |
Publisher | Morgan Kaufmann |
Pages | 1280 |
Release | 2017-05-10 |
Genre | Computers |
ISBN | 0128039299 |
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Written by leaders in the field Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices Presents methods for analysis, along with problem-solving techniques for implementing practical solutions
Network Security
Title | Network Security PDF eBook |
Author | BRAGG |
Publisher | McGraw Hill Professional |
Pages | 897 |
Release | 2012-08-11 |
Genre | Computers |
ISBN | 0071811737 |
Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.
The Security Risk Assessment Handbook
Title | The Security Risk Assessment Handbook PDF eBook |
Author | Douglas Landoll |
Publisher | CRC Press |
Pages | 504 |
Release | 2016-04-19 |
Genre | Business & Economics |
ISBN | 1439821496 |
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-wor