Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.
Questions About This Book?
- The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.
- The eBook copy of this book is not guaranteed to include any supplemental materials. Typically only the book itself is included.
Table of Contents
CHAPTER 1 - INTRODUCTION
CHAPTER 2 - SYSTEM ADMINISTRATION (PART 1)
CHAPTER 3 - SYSTEM ADMINISTRATION (PART 2)
CHAPTER 4 - THE BASIC INFORMATION SECURITY MODEL
CHAPTER 5 - ASSET IDENTIFICATION AND CHARACTERIZATION
CHAPTER 6 - THREATS AND VULNERABILITIES
CHAPTER 7 - ENCRYPTION CONTROLS
CHAPTER 8 - IDENTITY AND ACCESS MANAGEMENT
CHAPTER 9 - HARDWARE AND SOFTWARE CONTROLS
CHAPTER 10 - SHELL SCRIPTING
CHAPTER 11 - INCIDENT HANDLING
CHAPTER 12 - INCIDENT ANALYSIS
CHAPTER 13 - POLICIES, STANDARDS, AND GUIDELINES
CHAPTER 14 - IT RISK ANALYSIS AND RISK MANAGEMENT