Chapter 1. What is Information Security?
Models for discussing security
Information security in the real world
Chapter 2. Identification and Authentication
Identification and authentication in the real world
Chapter 3. Authorization and Access Control
Authorization and access control in the real world
Chapter 4. Auditing and Accountability
Accountability and auditing in the real world
Protecting data at rest, in motion, and in use
Cryptography in the real world
Chapter 6. Laws and Regulations
Chapter 7. Operations Security
Origins of operations security
The operations security process
Haas’ Laws of operations security
Operations security in our personal lives
Operations security in the real world
Chapter 8. Human Element Security
The security awareness and training program
Physical security in the real world
Network security in the real world
Chapter 11. Operating System Security
Software firewalls and host intrusion detection
Operating system security tools
Operating system security in the real world
Chapter 12. Application Security
Software development vulnerabilities
3.145.75.217