As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives...

Buy Now From Amazon

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.

The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.

  • Learn about information security without wading through a huge textbook
  • Covers both theoretical and practical aspects of information security
  • Provides a broad view of the information security field in a concise manner
  • All-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues


Similar Products

Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security PractitionersCybersecurity and Cyberwar: What Everyone Needs to Know®The Basics of Digital Forensics, Second Edition: The Primer for Getting Started in Digital ForensicsThe Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made EasyCybersecurity for BeginnersProblem Solving and Program Design in C (7th Edition)Practical Aspects of Interview and Interrogation, Second Edition (Practical Aspects of Criminal and Forensic Investigations)Security Risk Management: Building an Information Security Risk Management Program from the Ground Up