Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Page Title Page Copyright Page Dedication About the Author About the Technical Reviewer CONTENTS IN DETAIL ACKNOWLEDGMENTS INTRODUCTION
Who Should Read This Book? About This Book
1 WHAT IS INFORMATION SECURITY?
Defining Information Security When Are You Secure? Models for Discussing Security Issues Attacks Defense in Depth Summary Exercises
2 IDENTIFICATION AND AUTHENTICATION
Identification Authentication Common Identification and Authentication Methods Summary Exercises
3 AUTHORIZATION AND ACCESS CONTROLS
What Are Access Controls? Implementing Access Controls Access Control Models Physical Access Controls Summary Exercises
4 AUDITING AND ACCOUNTABILITY
Accountability Security Benefits of Accountability Auditing Summary Exercises
5 CRYPTOGRAPHY
The History of Cryptography Modern Cryptographic Tools Protecting Data at Rest, in Motion, and in Use Summary Exercises
6 COMPLIANCE, LAWS, AND REGULATIONS
What Is Compliance? Achieving Compliance with Controls Maintaining Compliance Laws and Information Security Adopting Frameworks for Compliance Compliance amid Technological Changes Summary Exercises
7 OPERATIONS SECURITY
The Operations Security Process Laws of Operations Security Operations Security in Our Personal Lives Origins of Operations Security Summary Exercises
8 HUMAN ELEMENT SECURITY
Gathering Information for Social Engineering Attacks Types of Social Engineering Attacks Building Security Awareness with Security Training Programs Summary Exercises
9 PHYSICAL SECURITY
Identifying Physical Threats Physical Security Controls Protecting People Protecting Data Protecting Equipment Summary Exercises
10 NETWORK SECURITY
Protecting Networks Protecting Network Traffic Network Security Tools Summary Exercises
11 OPERATING SYSTEM SECURITY
Operating System Hardening Protecting Against Malware Operating System Security Tools Summary Exercises
12 MOBILE, EMBEDDED, AND INTERNET OF THINGS SECURITY
Mobile Security Embedded Security Internet of Things Security Summary Exercises
13 APPLICATION SECURITY
Software Development Vulnerabilities Web Security Database Security Application Security Tools Summary Exercises
14 ASSESSING SECURITY
Vulnerability Assessment Penetration Testing Does This Really Mean You’re Secure? Summary Exercises
NOTES INDEX
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion