Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Dedication Author Biography Introduction
Book overview and key learning points Book audience How this book is organized Conclusion
Chapter 1. What is Information Security?
Introduction What is security? Alert! Models for discussing security More advanced Alert! Attacks Defense in depth Information security in the real world Summary Exercises References
Chapter 2. Identification and Authentication
Introduction Identification Authentication More advanced Additional resources Alert! Identification and authentication in the real world Summary Exercises References
Chapter 3. Authorization and Access Control
Introduction Authorization Access control More advanced More advanced Alert! More advanced Alert! Access control methodologies More advanced Authorization and access control in the real world Summary Exercises References
Chapter 4. Auditing and Accountability
Introduction Accountability More advanced Auditing Alert! Accountability and auditing in the real world More advanced Summary Exercises References
Chapter 5. Cryptography
Introduction History More advanced Additional resources Modern cryptographic tools More advanced Protecting data at rest, in motion, and in use Alert! Cryptography in the real world Summary Exercises References
Chapter 6. Laws and Regulations
Introduction Laws and regulations Compliance Privacy Summary Questions References
Chapter 7. Operations Security
Introduction Alert! Origins of operations security Additional resources The operations security process Haas’ Laws of operations security More advanced Operations security in our personal lives Alert! Operations security in the real world Summary Exercises References
Chapter 8. Human Element Security
Introduction Humans: the weak link Security awareness The security awareness and training program Summary Exercises References
Chapter 9. Physical Security
Introduction Alert! Additional resources Physical security controls Protecting people Protecting data More advanced Protecting equipment Note Physical security in the real world Summary Exercises References
Chapter 10. Network Security
Introduction Protecting networks Protecting network traffic Mobile device security Network security tools More advanced Additional resources Network security in the real world Summary Exercises References
Chapter 11. Operating System Security
Introduction Operating system hardening Protecting against malware Additional resources More advanced Software firewalls and host intrusion detection Operating system security tools Alert! Operating system security in the real world Summary Exercises References
Chapter 12. Application Security
Introduction The TJX breach Software development vulnerabilities Additional resources Web security Alert! More advanced Database security Additional resources Application security tools More advanced Application security in the real world Summary Exercises References
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion