Introduction
1 Introduction to Computer Security
2 Networks and the Internet
3 Cyber Stalking, Fraud, and Abuse
4 Denial of Service Attacks
5 Malware
6 Techniques Used by Hackers
7 Industrial Espionage in Cyberspace
8 Encryption
9 Computer Security Software
10 Security Policies
11 Network Scanning and Vulnerability Scanning
12 Cyber Terrorism and Information Warfare
13 Cyber Detective
14 Introduction to Forensics
A Glossary
B Resources
C Answers to the Multiple Choice Questions
Index
3.15.144.56