Section 3: Security Engineering and Cryptography

In this section, you will learn how to deploy various controls to protect enterprise data and systems. You will learn how to protect end devices using a variety of different technologies and learn the importance of cryptography and PKI when protecting enterprise data.

This part of the book comprises the following chapters:

  • Chapter 9, Enterprise Mobility and Endpoint Security Controls
  • Chapter 10, Security Considerations Impacting Specific Sectors and Operational Technologies
  • Chapter 11, Implementing Cryptographic Protocols and Algorithms
  • Chapter 12, Implementing Appropriate PKI Solutions, Cryptographic Protocols, and Algorithms for Business Needs
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.12.170