Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress
2014
|
Ausgabe: | Second edition. |
Schriftenreihe: | Syngress basics series
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780128007440/?ar |
Zusammenfassung: | As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects. |
Beschreibung: | Includes index. - Includes bibliographical references and index. - Online resource; title from PDF title page (ScienceDirect, viewed May 30, 2014) |
Umfang: | 1 Online-Ressource |
ISBN: | 9780128008126 0128008121 0128007443 9780128007440 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047406119 | ||
003 | DE-627-1 | ||
005 | 20240228115552.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
020 | |a 9780128008126 |c electronic bk. |9 978-0-12-800812-6 | ||
020 | |a 0128008121 |c electronic bk. |9 0-12-800812-1 | ||
020 | |a 0128007443 |9 0-12-800744-3 | ||
020 | |a 9780128007440 |9 978-0-12-800744-0 | ||
020 | |a 9780128007440 |9 978-0-12-800744-0 | ||
035 | |a (DE-627-1)047406119 | ||
035 | |a (DE-599)KEP047406119 | ||
035 | |a (ORHE)9780128007440 | ||
035 | |a (DE-627-1)047406119 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Andress, Jason |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The basics of information security |b understanding the fundamentals of InfoSec in theory and practice |c Jason Andress |
250 | |a Second edition. | ||
264 | 1 | |a Waltham, MA |b Syngress |c 2014 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Syngress basics series | |
500 | |a Includes index. - Includes bibliographical references and index. - Online resource; title from PDF title page (ScienceDirect, viewed May 30, 2014) | ||
520 | |a As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Information technology |x Security measures | |
650 | 0 | |a Information resources management | |
650 | 0 | |a Computer science | |
650 | 2 | |a Computer Security | |
650 | 2 | |a Information Management | |
650 | 2 | |a Electronic Data Processing | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures | |
650 | 4 | |a Gestion de l'information | |
650 | 4 | |a Informatique | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information resources management | |
650 | 4 | |a Information technology ; Security measures | |
776 | 1 | |z 9780128007440 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128007440 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780128007440/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047406119 |
---|---|
_version_ | 1835903222656532480 |
adam_text | |
any_adam_object | |
author | Andress, Jason |
author_facet | Andress, Jason |
author_role | aut |
author_sort | Andress, Jason |
author_variant | j a ja |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047406119 (DE-599)KEP047406119 (ORHE)9780128007440 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03468cam a22007212c 4500</leader><controlfield tag="001">ZDB-30-ORH-047406119</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115552.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128008126</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-800812-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128008121</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-800812-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128007443</subfield><subfield code="9">0-12-800744-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128007440</subfield><subfield code="9">978-0-12-800744-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128007440</subfield><subfield code="9">978-0-12-800744-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047406119</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047406119</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780128007440</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047406119</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Andress, Jason</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The basics of information security</subfield><subfield code="b">understanding the fundamentals of InfoSec in theory and practice</subfield><subfield code="c">Jason Andress</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Syngress basics series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Includes bibliographical references and index. - Online resource; title from PDF title page (ScienceDirect, viewed May 30, 2014)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information resources management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Information Management</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Electronic Data Processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion de l'information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information resources management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780128007440</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128007440</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780128007440/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047406119 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:15:50Z |
institution | BVB |
isbn | 9780128008126 0128008121 0128007443 9780128007440 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
series2 | Syngress basics series |
spelling | Andress, Jason VerfasserIn aut The basics of information security understanding the fundamentals of InfoSec in theory and practice Jason Andress Second edition. Waltham, MA Syngress 2014 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Syngress basics series Includes index. - Includes bibliographical references and index. - Online resource; title from PDF title page (ScienceDirect, viewed May 30, 2014) As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects. Computer security Computer networks Security measures Information technology Security measures Information resources management Computer science Computer Security Information Management Electronic Data Processing Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Gestion de l'information Informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Information technology ; Security measures 9780128007440 Erscheint auch als Druck-Ausgabe 9780128007440 |
spellingShingle | Andress, Jason The basics of information security understanding the fundamentals of InfoSec in theory and practice Computer security Computer networks Security measures Information technology Security measures Information resources management Computer science Computer Security Information Management Electronic Data Processing Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Gestion de l'information Informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Information technology ; Security measures |
title | The basics of information security understanding the fundamentals of InfoSec in theory and practice |
title_auth | The basics of information security understanding the fundamentals of InfoSec in theory and practice |
title_exact_search | The basics of information security understanding the fundamentals of InfoSec in theory and practice |
title_full | The basics of information security understanding the fundamentals of InfoSec in theory and practice Jason Andress |
title_fullStr | The basics of information security understanding the fundamentals of InfoSec in theory and practice Jason Andress |
title_full_unstemmed | The basics of information security understanding the fundamentals of InfoSec in theory and practice Jason Andress |
title_short | The basics of information security |
title_sort | basics of information security understanding the fundamentals of infosec in theory and practice |
title_sub | understanding the fundamentals of InfoSec in theory and practice |
topic | Computer security Computer networks Security measures Information technology Security measures Information resources management Computer science Computer Security Information Management Electronic Data Processing Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Gestion de l'information Informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Information technology ; Security measures |
topic_facet | Computer security Computer networks Security measures Information technology Security measures Information resources management Computer science Computer Security Information Management Electronic Data Processing Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Gestion de l'information Informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Information technology ; Security measures |
work_keys_str_mv | AT andressjason thebasicsofinformationsecurityunderstandingthefundamentalsofinfosecintheoryandpractice AT andressjason basicsofinformationsecurityunderstandingthefundamentalsofinfosecintheoryandpractice |