The basics of information security : understanding the fundamentals of InfoSec in theory and practice / Jason Andress, Steven Winterfeld, technical editor.
Material type:
- text
- unmediated
- volume
- 9780128007440
- 005.8 23
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Athi-River Campus Open Shelves | General Collection | QA76.9.A53 2014 (Browse shelf(Opens below)) | Available | BK0106327 | ||
![]() |
Athi-River Campus Open Shelves | General Collection | QA76.9.A53 2014 (Browse shelf(Opens below)) | Available | BK0106328 | ||
![]() |
Athi-River Campus Open Shelves | General Collection | QA76.9.A53 2014 (Browse shelf(Opens below)) | Available | BK0106329 | ||
![]() |
Nairobi Campus Store | General Collection | QA76.9.A53 2014 (Browse shelf(Opens below)) | Weeded | BK0106330 | ||
![]() |
Nairobi Campus Open Shelves | General Collection | QA76.9.A53 2014 (Browse shelf(Opens below)) | Available | BK0106331 |
Browsing Athi-River Campus shelves, Shelving location: Open Shelves, Collection: General Collection Close shelf browser (Hides shelf browser)
QA76.9.A25D37 2017 Hacking exposed : | QA76.9.A25D37 2017 Hacking exposed : | QA76.9.A53 2014 The basics of information security : | QA76.9.A53 2014 The basics of information security : | QA76.9.A53 2014 The basics of information security : | QA76.9.B43 2016 Grokking algorithms : | QA76.9.B43 2016 Grokking algorithms : |
Includes index
"The Basics of Information Security will provide the reader with a basic knowledge of information security in both theoretical and practical aspects. We will first cover the basic knowledge needed to understand the key concepts of information security, discussing many of the concepts that underpin the security world. We will then dive into practical applications of these ideas in the areas of operations, physical, network, operating system, and application security. Book Audience This book will provide a valuable resource to beginning security professionals, as well as to network and systems administrators. The information provided on can be used develop a better understanding on how we protect our information assets and defend against attacks, as well as how to apply these concepts practically"-- Provided by publisher.
There are no comments on this title.