Skip to main content

Introducing new learning courses and educational videos from Apress. Start watching

  • Book
  • Open Access
  • © 2014

The InfoSec Handbook

An Introduction to Information Security

Apress

Authors:

  • Lots of use cases to facilitate discussion and understanding

  • Different types of tool examples have been used in cases to develop broader view

  • Lends itself very easily as a ready reference

  • Easy to read style for quick understanding of the concepts

Buying options

Softcover Book
USD 44.99
Price excludes VAT (USA)

Table of contents (17 chapters)

  1. Front Matter

    Pages i-xxvii
  2. Introduction

    1. Front Matter

      Pages 1-2
    2. Introduction to Security

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 3-12Open Access
    3. History of Computer Security

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 13-25Open Access
  3. Key Principles and Practices

    1. Front Matter

      Pages 27-28
    2. Key Concepts and Principles

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 29-61Open Access
    3. Access Controls

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 63-76Open Access
    4. Information Systems Management

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 77-111Open Access
  4. Application Security

    1. Front Matter

      Pages 1-2
    2. Application and Web Security

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 115-139Open Access
    3. Malicious Software and Anti-Virus Software

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 141-161Open Access
    4. Cryptography

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 163-181Open Access
  5. Network Security

    1. Front Matter

      Pages 183-186
    2. Understanding Networks and Network Security

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 187-204Open Access
    3. Firewalls

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 205-223Open Access
    4. Intrusion Detection and Prevention Systems

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 225-243Open Access
    5. Virtual Private Networks

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 245-262Open Access
    6. Data Backups and Cloud Computing

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 263-288Open Access
  6. Physical Security

    1. Front Matter

      Pages 289-291
    2. Physical Security and Biometrics

      • Umesh Hodeghatta Rao, Umesha Nayak
      Pages 293-306Open Access

About this book

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base.

Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users.

This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face.

About the authors

Umesha Nayak is a director and principal consultant of MUSA software engineering pvt. Ltd. which is into systems / process / management consulting. He has 32 years experience, of which 11 years are in providing consultancy to IT / manufacturing for other organizations from across the globe. He is a master of science in software systems; master of arts in economics; CAIIB; certified information systems auditor (CISA) and certified risk and information systems control (CRISC) professional from ISACA, US; PGDFM; certified lead auditor for many of the standards, among others. He has worked extensively in banking, software development, product design and development, project management, program management, information technology audits, information application audits, quality assurance, coaching, product reliability, human resource management, consultancy, etc. He was vice president and corporate executive council member at Polaris software lab, Chennai prior to his current assignment. He also held various roles like head of quality, head of SEPG and head of strategic practice unit risks & treasury at Polaris software lab. He started his journey with computers in 1981 with ICL mainframes and continued further with minis, pcs etc. He was one of the founding members of the information systems auditing in the banking industry in India. He has effectively guided many organizations through successful ISO 9001/ISO 27001/CMMI certifications and process improvements.

Bibliographic Information

Buying options

Softcover Book
USD 44.99
Price excludes VAT (USA)