Home | Amazing | Today | Tags | Publishers | Years | Search 
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Buy

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a cryptographer. All you really want is a book that makes you fall asleep every 30 minutes instead of every five. It’s all the “necessary evil” that must be endured, right? Not this time, my budding security professional.

So let’s be honest. You actually do have a strong interest in making security a career and not just a hobby. Why else would you have this book in your hand? But like many of you, I didn’t know (and sometimes still wonder to this day) what I wanted to be when I grew up. So why this book? What’s so great about another extensive volume on information security? How does it help me not only to learn the basics but also to push my career aspirations in the right direction?

When my son was 4, I took him to the park down the road from our house. There were kids playing baseball, others chasing their friends through the plastic and metal jungle, and even a few climbing the fake rock-climbing wall. Then he saw the boys at the skateboard park. He had a board of his own but never knew someone could do that! Of course, he wanted to try it immediately. As a responsible Dad, I couldn’t let him launch himself off the top of a 6-foot ramp only to end up unconscious waiting to be run over by the next prepubescent wannabe Tony Hawk. But what I could do is require him to show me that he could do something basic like stand on the board and ride it all the way down the driveway at home. As a reward, he could go to the skate park. Once there, he didn’t feel quite as comfortable as when on the driveway, so he rode down the ramp while sitting. Eventually, he dictated his own path; he set his own goals; he controlled the time it took to get where he wanted to be.

His path was different from many others at the park that day. But imagine if we never went to the park. How about if he only saw a baseball being tossed and no home runs? What if he didn’t even get to see the skate park, much less the kids airing the gap? Knowing what is possible can drastically change one’s destiny. And so it is with a profession in security.

Pro Spring 2.5
Pro Spring 2.5
Recently, the Java world has witnessed a dramatic shift away from so-called “heavyweight” architectures such as Enterprise JavaBeans (EJB) toward lighter weight frameworks such as Spring. Complex and container-dependent services, such as CMP, and transaction management systems have been replaced with simpler alternatives such as...
Frommer's Cape Cod, Nantucket & Martha's Vineyard 2005 (Frommer's Complete)
Frommer's Cape Cod, Nantucket & Martha's Vineyard 2005 (Frommer's Complete)
You’ll never fall into the tourist traps when you travel with Frommer’s. It’s like having a friend show you around, taking you to the places locals like best. Our expert authors have already gone everywhere you might go – they’ve done the legwork for you, and they’re not afraid to provide you with honest and...
Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...

Learning Perl on Win32 Systems
Learning Perl on Win32 Systems
In this smooth, carefully paced course, leading Perl trainers and a Windows NT practitioner teach you to program in the language that promises to emerge as the scripting language of choice on NT. Perl for Win32 is a language for easily manipulating text, files, user and group profiles, performance and event logs, and registry entries. Based on...
Security 2020: Reduce Security Risks This Decade
Security 2020: Reduce Security Risks This Decade

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT...

Applied ADO.NET: Building Data-Driven Solutions
Applied ADO.NET: Building Data-Driven Solutions

Applied ADO.NET: Building Data-Driven Solutions provides extensive coverage of ADO.NET technology including ADO.NET internals, namespaces, classes, and interfaces. Where most books cover only SQL and OLE DB data providers, Mahesh Chand and David Talbot cover SQL, OLE DB, ODBC data providers and the latest additions to ADO.NET:...

©2024 LearnIT (support@pdfchm.net) - Privacy Policy