000 03836nam a22005295i 4500
001 978-1-4302-6383-8
003 DE-He213
005 20210511120153.0
007 cr nn 008mamaa
008 140917s2014 xxu| s |||| 0|eng d
020 _a9781430263838
_9978-1-4302-6383-8
024 7 _a10.1007/978-1-4302-6383-8
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
082 0 4 _a005.8
_223
100 1 _aNayak, Umesha.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_93852
245 1 4 _aThe InfoSec Handbook
_h[electronic resource] :
_bAn Introduction to Information Security /
_cby Umesha Nayak, Umesh Hodeghatta Rao.
250 _a1st ed. 2014.
264 1 _aBerkeley, CA :
_bApress :
_bImprint: Apress,
_c2014.
300 _aXXIV, 392 p. 303 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
506 0 _aOpen Access
520 _aThe InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face.
650 0 _aData protection.
_9210
650 0 _aData encryption (Computer science).
_92579
650 0 _aComputers.
_9718
650 1 4 _aSecurity.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28000
_9215
650 2 4 _aCryptology.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28020
_92580
650 2 4 _aInformation Systems and Communication Service.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I18008
_91176
700 1 _aRao, Umesh Hodeghatta.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_93853
710 2 _aSpringerLink (Online service)
_9141
776 0 8 _iPrinted edition:
_z9781430263821
776 0 8 _iPrinted edition:
_z9781430263845
856 4 0 _uhttps://doi.org/10.1007/978-1-4302-6383-8
912 _aZDB-2-CWD
912 _aZDB-2-SXPC
912 _aZDB-2-SOB
942 _cEBK
_w1
_xAdministrator Library
_y1
_z Administrator Library
999 _c812
_d812
773 _tSpringer Nature Open Access eBook