Chapter 1. Fault Tolerance and Resilience in Cloud Computing Environments
3 Basic Concepts on Fault Tolerance
4 Different Levels of Fault Tolerance in Cloud Computing
5 Fault Tolerance against Crash Failures in Cloud Computing
6 Fault Tolerance against Byzantine Failures in Cloud Computing
7 Fault Tolerance as a Service in Cloud Computing
Chapter Review Questions/Exercises
2 Mathematical Prelude to Cryptography
6 The Internal Functions of Rijndael in AES Implementation
11 Elliptic Curve Cryptosystems
12 Message Integrity and Authentication
13 Triple Data Encryption Algorithm (TDEA) Block Cipher
Chapter Review Questions/Exercises
Chapter 3. Public Key Infrastructure
4 X.509 Implementation Architectures
5 X.509 Certificate Validation
6 X.509 Certificate Revocation
7 Server-Based Certificate Validity Protocol
8 X.509 Bridge Certification Systems
11 PKI Standards Organizations
16 Alternative PKI Architectures
17 Modified X.509 Architectures
18 Alternative Key Management Models
Chapter Review Questions/Exercises
Chapter 4. Physical Security Essentials
3 Physical Security Prevention and Mitigation Measures
4 Recovery from Physical Security Breaches
5 Threat Assessment, Planning, and Plan Implementation
6 Example: A Corporate Physical Security Policy
7 Integration of Physical and Logical Security
Chapter Review Questions/Exercises
2 Measuring Risk and Avoiding Disaster
3 The Business Impact Assessment (BIA)
Chapter Review Questions/Exercises
2 Biometric System Architecture
Chapter Review Questions/Exercises
2 Homeland Security Presidential Directives
Chapter Review Questions/Exercises
4 Cyber Warfare: Making CW Possible
6 Holistic View of Cyber Warfare
Chapter Review Questions/Exercises
Chapter Review Questions/Exercises
Chapter 10. Securing the Infrastructure
1 Communication Security Goals
Chapter Review Questions/Exercises
1 Infrastructure Weaknesses: DAC, MAC, and RBAC
2 Strengthening the Infrastructure: Authentication Systems
Chapter Review Questions/Exercises
Chapter 12. Assessments and Audits
1 Assessing Vulnerabilities and Risk: Penetration Testing and Vulnerability Assessments
2 Risk Management: Quantitative Risk Measurements
Chapter Review Questions/Exercises
Chapter 13. Fundamentals of Cryptography
1 Assuring Privacy with Encryption
Chapter Review Questions/Exercises
Chapter 14. Satellite Cyber Attack Search and Destroy
1 Hacks, Interference, and Jamming
Chapter Review Questions/Exercises
Chapter 15. Advanced Data Encryption
1 Mathematical Concepts Reviewed
3.145.14.200