The InfoSec Handbook An Introduction to Information Security /
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginne...
Saved in:
Main Authors: | , |
---|---|
Corporate Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Berkeley, CA :
Apress : Imprint: Apress,
2014.
|
Edition: | 1st ed. 2014. |
Subjects: | |
Online Access: | Link to Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam a22000005i 4500 | ||
---|---|---|---|
001 | 978-1-4302-6383-8 | ||
003 | DE-He213 | ||
005 | 20220124155856.0 | ||
007 | cr nn 008mamaa | ||
008 | 140917s2014 xxu| s |||| 0|eng d | ||
020 | |a 9781430263838 |9 978-1-4302-6383-8 | ||
024 | 7 | |a 10.1007/978-1-4302-6383-8 |2 doi | |
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
072 | 7 | |a UR |2 thema | |
072 | 7 | |a UTN |2 thema | |
082 | 0 | 4 | |a 005.8 |2 23 |
100 | 1 | |a Nayak, Umesha. |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
245 | 1 | 4 | |a The InfoSec Handbook |h [electronic resource] : |b An Introduction to Information Security / |c by Umesha Nayak, Umesh Hodeghatta Rao. |
250 | |a 1st ed. 2014. | ||
264 | 1 | |a Berkeley, CA : |b Apress : |b Imprint: Apress, |c 2014. | |
300 | |a XXIV, 392 p. 303 illus. |b online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
506 | 0 | |a Open Access | |
520 | |a The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it's an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face. | ||
650 | 0 | |a Data protection. | |
650 | 0 | |a Cryptography. | |
650 | 0 | |a Data encryption (Computer science). | |
650 | 0 | |a Computer networks . | |
650 | 1 | 4 | |a Data and Information Security. |
650 | 2 | 4 | |a Cryptology. |
650 | 2 | 4 | |a Computer Communication Networks. |
700 | 1 | |a Rao, Umesh Hodeghatta. |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
710 | 2 | |a SpringerLink (Online service) | |
773 | 0 | |t Springer Nature eBook | |
776 | 0 | 8 | |i Printed edition: |z 9781430263821 |
776 | 0 | 8 | |i Printed edition: |z 9781430263845 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4302-6383-8 |z Link to Metadata |
912 | |a ZDB-2-CWD | ||
912 | |a ZDB-2-SXPC | ||
912 | |a ZDB-2-SOB | ||
950 | |a Professional and Applied Computing (SpringerNature-12059) | ||
950 | |a Professional and Applied Computing (R0) (SpringerNature-43716) |