The basics of information security: understanding the fundamentals of InfoSec in theory and practice
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, MA
Syngress
2014
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | BTU01 FUBA1 FLA01 Volltext |
Beschreibung: | Includes index As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 9780128008126 0128008121 9780128007440 0128007443 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042300251 | ||
003 | DE-604 | ||
005 | 20190408 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780128008126 |c electronic bk. |9 978-0-12-800812-6 | ||
020 | |a 0128008121 |c electronic bk. |9 0-12-800812-1 | ||
020 | |a 9780128007440 |9 978-0-12-800744-0 | ||
020 | |a 0128007443 |9 0-12-800744-3 | ||
020 | |a 9780128007440 |9 978-0-12-800744-0 | ||
035 | |a (ZDB-33-EBS)ocn880706587 | ||
035 | |a (OCoLC)880706587 | ||
035 | |a (DE-599)BVBBV042300251 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-188 |a DE-634 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Andress, Jason |e Verfasser |4 aut | |
245 | 1 | 0 | |a The basics of information security |b understanding the fundamentals of InfoSec in theory and practice |c Jason Andress |
250 | |a Second edition | ||
264 | 1 | |a Waltham, MA |b Syngress |c 2014 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Information Management | |
650 | 4 | |a Computer Security | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer science |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information resources management |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Information resources management | |
650 | 4 | |a Computer science | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128007440 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027737243 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128007440 |l BTU01 |p ZDB-33-EBS |q BTU_PDA_EBS_Kauf |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128007440 |l FUBA1 |p ZDB-33-ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128007440 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152877442138112 |
---|---|
any_adam_object | |
author | Andress, Jason |
author_facet | Andress, Jason |
author_role | aut |
author_sort | Andress, Jason |
author_variant | j a ja |
building | Verbundindex |
bvnumber | BV042300251 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn880706587 (OCoLC)880706587 (DE-599)BVBBV042300251 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03664nmm a2200709zc 4500</leader><controlfield tag="001">BV042300251</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190408 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128008126</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-800812-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128008121</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-800812-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128007440</subfield><subfield code="9">978-0-12-800744-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128007443</subfield><subfield code="9">0-12-800744-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128007440</subfield><subfield code="9">978-0-12-800744-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn880706587</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)880706587</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300251</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Andress, Jason</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The basics of information security</subfield><subfield code="b">understanding the fundamentals of InfoSec in theory and practice</subfield><subfield code="c">Jason Andress</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer science</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information resources management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128007440</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737243</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128007440</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-33-EBS</subfield><subfield code="q">BTU_PDA_EBS_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128007440</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128007440</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042300251 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:42Z |
institution | BVB |
isbn | 9780128008126 0128008121 9780128007440 0128007443 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027737243 |
oclc_num | 880706587 |
open_access_boolean | |
owner | DE-1046 DE-188 DE-634 |
owner_facet | DE-1046 DE-188 DE-634 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD ZDB-33-EBS BTU_PDA_EBS_Kauf ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Andress, Jason Verfasser aut The basics of information security understanding the fundamentals of InfoSec in theory and practice Jason Andress Second edition Waltham, MA Syngress 2014 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Includes index As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects Includes bibliographical references and index Information Management Computer Security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer science fast Computer security fast Information resources management fast Information technology / Security measures fast Informatik Computer security Computer networks Security measures Information technology Security measures Information resources management Computer science Computersicherheit (DE-588)4274324-2 gnd rswk-swf Electronic books Computersicherheit (DE-588)4274324-2 s 1\p DE-604 http://www.sciencedirect.com/science/book/9780128007440 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Andress, Jason The basics of information security understanding the fundamentals of InfoSec in theory and practice Information Management Computer Security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer science fast Computer security fast Information resources management fast Information technology / Security measures fast Informatik Computer security Computer networks Security measures Information technology Security measures Information resources management Computer science Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | The basics of information security understanding the fundamentals of InfoSec in theory and practice |
title_auth | The basics of information security understanding the fundamentals of InfoSec in theory and practice |
title_exact_search | The basics of information security understanding the fundamentals of InfoSec in theory and practice |
title_full | The basics of information security understanding the fundamentals of InfoSec in theory and practice Jason Andress |
title_fullStr | The basics of information security understanding the fundamentals of InfoSec in theory and practice Jason Andress |
title_full_unstemmed | The basics of information security understanding the fundamentals of InfoSec in theory and practice Jason Andress |
title_short | The basics of information security |
title_sort | the basics of information security understanding the fundamentals of infosec in theory and practice |
title_sub | understanding the fundamentals of InfoSec in theory and practice |
topic | Information Management Computer Security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer science fast Computer security fast Information resources management fast Information technology / Security measures fast Informatik Computer security Computer networks Security measures Information technology Security measures Information resources management Computer science Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Information Management Computer Security COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer science Computer security Information resources management Information technology / Security measures Informatik Computer networks Security measures Information technology Security measures Computersicherheit |
url | http://www.sciencedirect.com/science/book/9780128007440 |
work_keys_str_mv | AT andressjason thebasicsofinformationsecurityunderstandingthefundamentalsofinfosecintheoryandpractice |