InfoSec Handbook -  Umesha Nayak,  Umesh Hodeghatta Rao

InfoSec Handbook (eBook)

An Introduction to Information Security
eBook Download: EPUB
2014 | 1st ed.
XXIV, 392 Seiten
Apress (Verlag)
978-1-4302-6383-8 (ISBN)
Systemvoraussetzungen
3,84 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face.

Umesha Nayak is a director and principal consultant of MUSA software engineering pvt. Ltd. which is into systems / process / management consulting. He has 32 years experience, of which 11 years are in providing consultancy to IT / manufacturing for other organizations from across the globe. He is a master of science in software systems; master of arts in economics; CAIIB; certified information systems auditor (CISA) and certified risk and information systems control (CRISC) professional from ISACA, US; PGDFM; certified lead auditor for many of the standards, among others. He has worked extensively in banking, software development, product design and development, project management, program management, information technology audits, information application audits, quality assurance, coaching, product reliability, human resource management, consultancy, etc. He was vice president and corporate executive council member at Polaris software lab, Chennai prior to his current assignment. He also held various roles like head of quality, head of SEPG and head of strategic practice unit risks & treasury at Polaris software lab. He started his journey with computers in 1981 with ICL mainframes and continued further with minis, pcs etc. He was one of the founding members of the information systems auditing in the banking industry in India. He has effectively guided many organizations through successful ISO 9001/ISO 27001/CMMI certifications and process improvements.

1: Introduction to Security2: History of Computer Security3: Key Concepts and Principles4: Access Controls5: Information Systems Management6:Application and Web Security7: Malicious Software and Anti-Virus Software8: Cryptography9: Understanding Networks10: Firewalls11: Intrusion Detection and Prevention Systems12: Virtual Private Networks13: Data Backups & Cloud Computing14: Physical Security and Biometrics15: Social Engineering16. Current Trends in Information Security17. Bibliography

Erscheint lt. Verlag 17.9.2014
Verlagsort Berkeley
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
ISBN-10 1-4302-6383-0 / 1430263830
ISBN-13 978-1-4302-6383-8 / 9781430263838
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90