High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.Foundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Best selling author Jason Andress provides the basic knowledge needed to understa…
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
Foundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Best selling author Jason Andress provides the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. Each chapter explores one main security concept, lists scenarios in which the concept is applicable, and discusses the implementation of that concept in detail, often by going over rival models or strategies. Readers will come away with a sense of what types of assets need protecting, what kinds of risks exist, and what kinds of defensive measures can be taken.
High-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
Foundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Best selling author Jason Andress provides the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. Each chapter explores one main security concept, lists scenarios in which the concept is applicable, and discusses the implementation of that concept in detail, often by going over rival models or strategies. Readers will come away with a sense of what types of assets need protecting, what kinds of risks exist, and what kinds of defensive measures can be taken.
Atsauksmes
Nav atsauksmju
0 klienti novērtēja šo produktu.
5
0%
4
0%
3
0%
2
0%
1
0%
Cenas garantija
Bookbook.lv garantē labāko cenu produktiem, kas marķēti ar birku "Cenas garantija". Ja identiska prece citā interneta veikalā maksā lētāk, mēs atmaksāsim cenu starpību. Cenas tiek salīdzinātas ar Bookbook.lv norādītajām produktu cenām. Bookbook.lv apņemas kompensēt cenu starpību pircējam, kurš ir pieteicies "Cenu garantijai", saskaņā ar "Cenu garantijas" noteikumos minētajiem nosacījumiem. Uzzini vairāk
E-grāmata
22,39 €
UZMANĪBU!
Šī grāmata sniedz ACSM formāts. Tas nav piemērots parastajiem lasītājiem, kas atbalsta EPUB vai MOBI e-grāmatu formātus.
Svarīgi! Veicot savienojumu no Apvienotās Karalistes, nav iespējams lejupielādēt e-grāmatas.
Šo grāmatu pārdod privātpersona. Kad būsiet samaksājis par pasūtījumu, grāmatas pārdevējs to nosūtīs 7 dienu laikā . Ja pārdevējs to neizdarīs laikus, jums tiks automātiski atmaksāta nauda.
Šīs grāmatas stāvokli nav vērtējuši Bookbook.lv eksperti, tāpēc par grāmatas kvalitāti atbildīgs ir tikai pārdevējs.
Vai vēlaties pārdot izlasītās grāmatas un pelnīt naudu? Uzzini vairāk šeit
Produkts veiksmīgi pievienots grozam
Lasīt grāmatu:
Jauna grāmata, kas tiek pārdota tieši no Bookbook.lv noliktavas. Grāmatas kvalitāti ir novērtējuši Bookbook.lv eksperti.
Atsauksmes