The InfoSec Handbook

The InfoSec Handbook introduces the real-world challenges of establishing and maintaining information security in an organization. The book offers a practical view of the importance of following standard security practices. It also provides solid technical information about security. Beginning users to experienced engineers get insights on the latest policies, practices, tools, and technologies that are available. Information security is constantly changing, and demands the attention of all stakeholders in an organization. Whatever their jobs, users will always be confronted with different security risks. The range of risks can vary, and should always be managed according to established best practices. Unfortunately, not everyone is aware of the risks or how to prevent them; as a result, this lack of awareness often causes most of the security problems in an organization. When users don’t follow security precautions, many breaches can arise from system compromises to the loss of data and information. This book is intended to educate all users about the kinds of security practices and standards that exist. It also covers how to manage security software and updates in order to protect organizations from possible security threats they could encounter.

[1]  C. Breen,et al.  Signaling systems for control of telephone switching , 1960 .

[2]  THE GREAT WAR THAT ALMOST WAS: CRIMEA, 1853-1856 , 1973, The US Army War College Quarterly: Parameters.

[3]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[4]  Donn B. Parker,et al.  Fighting computer crime , 1983 .

[5]  Tim Berners-Lee The World-Wide Web Initiative , 1992 .

[6]  Janet Ellen Abbate From ARPANET to Internet: A history of ARPA -sponsored computer networks, 1966--1988 , 1994 .

[7]  Dale K. Pace,et al.  The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .

[8]  Richard Brackney Cyber-intrusion response , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[9]  Louis Kruh,et al.  THE COMMERCIAL ENIGMA: BEGINNINGS OF MACHINE CRYPTOGRAPHY , 2002, Cryptologia.

[10]  Elisabeth Rakus-Andersson The Brains behind the Enigma Code Breaking before the Second World War , 2003 .

[11]  Christopher J. Coyne,et al.  THE ECONOMICS OF COMPUTER HACKING , 2005 .

[12]  Kristi Short,et al.  An Examination of the Components and Mathematics of the Enigma Electromechanical Rotor Ciphers , 2007 .

[13]  Michael A. Simon,et al.  Biometrics For Dummies , 2008 .

[14]  Xi Wang,et al.  Improving application security with data flow assertions , 2009, SOSP '09.

[15]  Tim Berners-Lee,et al.  World-Wide Web: The Information Universe , 1992, Electron. Netw. Res. Appl. Policy.

[16]  F. J. Corbat INTRODUCTION AND OVERVIEW OF THE MULTICS SYSTEM , 2010 .

[17]  Ronald L. Krutz,et al.  Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .