
000 | 00000cam u2200205 a 4500 | |
001 | 000046107759 | |
005 | 20220208134322 | |
008 | 220208s2019 caua b 001 0 eng | |
010 | ▼a 2019024099 | |
020 | ▼a 9781718500044 (paperback) | |
020 | ▼a 1718500041 (paperback) | |
020 | ▼a 9781718500051 (ebook) | |
035 | ▼a (KERIS)REF000019571450 | |
040 | ▼a DLC ▼b eng ▼c DLC ▼e rda ▼d DLC ▼d 211009 | |
042 | ▼a pcc | |
050 | 0 0 | ▼a QA76.9.A25 ▼b A5445 2019 |
082 | 0 0 | ▼a 005.8 ▼2 23 |
084 | ▼a 005.8 ▼2 DDCK | |
090 | ▼a 005.8 ▼b A561f | |
100 | 1 | ▼a Andress, Jason, ▼e author. |
245 | 1 0 | ▼a Foundations of information security : ▼b a straightforward introduction / ▼c by Jason Andress. |
260 | ▼a San Francisco : ▼b No Starch Press, ▼c 2019. | |
264 | 1 | ▼a San Francisco : ▼b No Starch Press, ▼c [2019] |
300 | ▼a xxi, 222 p. : ▼b ill. ; ▼c 24 cm. | |
336 | ▼a text ▼b txt ▼2 rdacontent | |
337 | ▼a unmediated ▼b n ▼2 rdamedia | |
338 | ▼a volume ▼b nc ▼2 rdacarrier | |
504 | ▼a Includes bibliographical references and index. | |
520 | ▼a "Begins with an introduction to information security, including key topics such as confidentiality, integrity, and availability, and then moves on to practical applications of these ideas in the areas of operational, physical, network, application, and operating system security"-- ▼c Provided by publisher. | |
650 | 0 | ▼a Computer security. |
650 | 0 | ▼a Computer networks ▼x Security measures. |
650 | 0 | ▼a Electronic information resources ▼x Access control. |
945 | ▼a KLPA |
소장정보
No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
---|---|---|---|---|---|---|---|
No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 A561f | 등록번호 121258993 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
목차
Introduction Chapter 1: What is Information Security? Chapter 2: Indentification and Authentication Chapter 3: Authorization and Access Control Chapter 4: Auditing and Accountability Chapter 5: Cryptography Chapter 6: Compliance, Laws, and Regulations Chapter 7: Operations Security Chapter 8: Human Element Security Chapter 9: Physical Security Chapter 10: Network Security Chapter 11: Operating System Security Chapter 12: Mobile, Embedded, and Internet of Things Security Chapter 13: Application Security Chapter 14: Assessing Security Notes