The InfoSec Handbook

An Introduction to Information Security

by Umesh Hodeghatta Rao, Umesha Nayak

DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base.

Security is a constantly growing concern that everyone must deal with. Whether it's an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users.

This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face.

This open book is licensed under a Creative Commons License (CC BY-NC-ND). You can download The InfoSec Handbook ebook for free in PDF format (11.0 MB).

Table of Contents

Part I
Introduction
1
Chapter 1
Introduction to Security
3
Chapter 2
History of Computer Security
13
Part II
Key Principles and Practices
27
Chapter 3
Key Concepts and Principles
29
Chapter 4
Access Controls
63
Chapter 5
Information Systems Management
77
Part III
Application Security
113
Chapter 6
Application and Web Security
115
Chapter 7
Malicious Software and Anti-Virus Software
141
Chapter 8
Cryptography
163
Part IV
Network Security
183
Chapter 9
Understanding Networks and Network Security
187
Chapter 10
Firewalls
205
Chapter 11
Intrusion Detection and Prevention Systems
225
Chapter 12
Virtual Private Networks
245
Chapter 13
Data Backups and Cloud Computing
263
Part V
Physical Security
289
Chapter 14
Physical Security and Biometrics
293
Chapter 15
Social Engineering
307
Chapter 16
Current Trends in Information Security
325

Book Details

Subject
Computer Science
Publisher
Apress
Published
2014
Pages
376
Edition
1
Language
English
ISBN13
9781430263821
ISBN10
1430263822
ISBN13 Digital
9781430263838
ISBN10 Digital
1430263830
PDF Size
11.0 MB
License
CC BY-NC-ND

Related Books

The SysAdmin Handbook
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential refere...
The EBMT Handbook
This Open Access 7th edition of the European Society for Blood and Marrow Transplantation (EBMT) handbook addresses the latest developments and innovations in hematopoietic stem cell transplantation and cellular therapy. Consisting of 93 chapters, it has been written by 175 leading experts in the field. Discussing all types of stem cell and bone ...
The GEO Handbook on Biodiversity Observation Networks
Biodiversity observation systems are almost everywhere inadequate to meet local, national and international (treaty) obligations. As a result of alarmingly rapid declines in biodiversity in the modern era, there is a strong, worldwide desire to upgrade our monitoring systems, but little clarity on what is actually needed and how it can be assembled...
Social Theory of Fear
In the current crisis of the capitalist world system, elites promote fear of crime and terrorism to keep and expand their privileges and control the masses. This book offers an analysis of the crisis and strategies for rebellion....
Handbook of Mathematical Geosciences
This Open Access handbook published at the IAMG's 50th anniversary, presents a compilation of invited path-breaking research contributions by award-winning geoscientists who have been instrumental in shaping the IAMG. It contains 45 chapters that are categorized broadly into five parts (i) theory, (ii) general applications, (iii) exploration and re...
Humanities World Report 2015
The first of its kind, this Open Access 'Report' is a first step in assessing the state of the humanities worldwide. Based on an extensive literature review and enlightening interviews the book discusses the value of the humanities, the nature of humanities research and the relation between humanities and politics, amongst other issues....