Overview
- Lots of use cases to facilitate discussion and understanding
- Different types of tool examples have been used in cases to develop broader view
- Lends itself very easily as a ready reference
- Easy to read style for quick understanding of the concepts
Buy print copy
Tax calculation will be finalised at checkout
About this book
It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base.
Security is a constantly growing concern that everyone must deal with. Whether its an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users.
This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face.
Similar content being viewed by others
Table of contents (17 chapters)
-
Introduction
-
Key Principles and Practices
-
Application Security
-
Network Security
-
Physical Security
About the authors
Bibliographic Information
Book Title: The InfoSec Handbook
Book Subtitle: An Introduction to Information Security
Authors: Umesh Hodeghatta Rao, Umesha Nayak
DOI: https://doi.org/10.1007/978-1-4302-6383-8
Publisher: Apress Berkeley, CA
eBook Packages: Professional and Applied Computing, Apress Access Books, Professional and Applied Computing (R0)
Copyright Information: Umesha Nayak and Umesh Rao 2014
Softcover ISBN: 978-1-4302-6382-1Published: 30 August 2014
eBook ISBN: 978-1-4302-6383-8Published: 17 September 2014
Edition Number: 1
Number of Pages: XXIV, 392
Number of Illustrations: 303 b/w illustrations
Topics: Security, Cryptology, Information Systems and Communication Service