Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.
Questions About This Book?
- The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
- The Used copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included.
- The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.
- The eBook copy of this book is not guaranteed to include any supplemental materials. Typically only the book itself is included.
Table of Contents
CHAPTER 1 - INTRODUCTION
CHAPTER 2 - SYSTEM ADMINISTRATION (PART 1)
CHAPTER 3 - SYSTEM ADMINISTRATION (PART 2)
CHAPTER 4 - THE BASIC INFORMATION SECURITY MODEL
CHAPTER 5 - ASSET IDENTIFICATION AND CHARACTERIZATION
CHAPTER 6 - THREATS AND VULNERABILITIES
CHAPTER 7 - ENCRYPTION CONTROLS
CHAPTER 8 - IDENTITY AND ACCESS MANAGEMENT
CHAPTER 9 - HARDWARE AND SOFTWARE CONTROLS
CHAPTER 10 - SHELL SCRIPTING
CHAPTER 11 - INCIDENT HANDLING
CHAPTER 12 - INCIDENT ANALYSIS
CHAPTER 13 - POLICIES, STANDARDS, AND GUIDELINES
CHAPTER 14 - IT RISK ANALYSIS AND RISK MANAGEMENT