Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
Dedication
Author Biography
Introduction
Book overview and key learning points
Book audience
How this book is organized
Conclusion
Chapter 1. What is Information Security?
Introduction
What is security?
Alert!
Models for discussing security
More advanced
Alert!
Attacks
Defense in depth
Information security in the real world
Summary
Exercises
References
Chapter 2. Identification and Authentication
Introduction
Identification
Authentication
More advanced
Additional resources
Alert!
Identification and authentication in the real world
Summary
Exercises
References
Chapter 3. Authorization and Access Control
Introduction
Authorization
Access control
More advanced
More advanced
Alert!
More advanced
Alert!
Access control methodologies
More advanced
Authorization and access control in the real world
Summary
Exercises
References
Chapter 4. Auditing and Accountability
Introduction
Accountability
More advanced
Auditing
Alert!
Accountability and auditing in the real world
More advanced
Summary
Exercises
References
Chapter 5. Cryptography
Introduction
History
More advanced
Additional resources
Modern cryptographic tools
More advanced
Protecting data at rest, in motion, and in use
Alert!
Cryptography in the real world
Summary
Exercises
References
Chapter 6. Laws and Regulations
Introduction
Laws and regulations
Compliance
Privacy
Summary
Questions
References
Chapter 7. Operations Security
Introduction
Alert!
Origins of operations security
Additional resources
The operations security process
Haas’ Laws of operations security
More advanced
Operations security in our personal lives
Alert!
Operations security in the real world
Summary
Exercises
References
Chapter 8. Human Element Security
Introduction
Humans: the weak link
Security awareness
The security awareness and training program
Summary
Exercises
References
Chapter 9. Physical Security
Introduction
Alert!
Additional resources
Physical security controls
Protecting people
Protecting data
More advanced
Protecting equipment
Note
Physical security in the real world
Summary
Exercises
References
Chapter 10. Network Security
Introduction
Protecting networks
Protecting network traffic
Mobile device security
Network security tools
More advanced
Additional resources
Network security in the real world
Summary
Exercises
References
Chapter 11. Operating System Security
Introduction
Operating system hardening
Protecting against malware
Additional resources
More advanced
Software firewalls and host intrusion detection
Operating system security tools
Alert!
Operating system security in the real world
Summary
Exercises
References
Chapter 12. Application Security
Introduction
The TJX breach
Software development vulnerabilities
Additional resources
Web security
Alert!
More advanced
Database security
Additional resources
Application security tools
More advanced
Application security in the real world
Summary
Exercises
References
Index
← Prev
Back
Next →
← Prev
Back
Next →