Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
About the Author Prologue Introduction Chapter 1: Cyber Security Standards
Payment Card Industry Data Security Standard (PCI DSS) Sarbanes-Oxley Act (SOX)
Chapter 2: What’s In Place
Key Questions to Ask When There is a Plan Chart to Assist in Determining What is in Place
Chapter 3: Risks and Mitigations
Why Have Cyber Security? What Are The Risks? Security Policy Cyber Terrorism or Cyber Attack? Getting Started Physical Security Is an Important Part of Cyber Security Passwords Anti-Virus Software Firewalls Spyware and Viruses Malicious Code
Chapter 4: Impacts and Preparation
Preparations Before an Event or Incident Cyber Security Incident Response (CSIRT)
Chapter 5: The Attack
Cyber Attacks can take the form of: What Can Be Done? Implement at a Minimum. Process for Cyber Security Goals and Motivation Motivation Cyber Attack Tools Viruses
Chapter 6: Protection
Protecting the Data Center Intrusion Detection Four Types of IDS/IPS Honeypots Security Information and Event Management Summary:
Chapter 7: Self-Assessment Tests
Chapter 1 Test Chapter 2 Test Chapter 3 Test Chapter 4 Test Chapter 5 Test Chapter 6 Test
Chapter 8: Self-Assessment Tests (Answers)
Chapter 1 Test Chapter 2 Test Chapter 3 Test Chapter 4 Test Chapter 5 Test Chapter 6 Test
Contact the Author
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion