Chapter 1: Introduction and Security Trends
Chapter 2: General Security Concepts
Chapter 3: Operational/Organizational Security
Chapter 4: The Role of People in Security
Chapter 5: Cryptography
Chapter 6: Public Key Infrastructure
Chapter 7: Standards and Protocols
Chapter 8: Physical Security
Chapter 9: Network Fundamentals
Chapter 10: Infrastructure Security
Chapter 11: Authentication and Remote Access
Chapter 12: Wireless Security and Mobile Devices
Chapter 13: Intrusion Detection Systems and Network Security
Chapter 14: Baselines
Chapter 15: Types of Attacks and Malicious Software
Chapter 16: E-mail and Instant Messaging
Chapter 17: Web Components
Chapter 18: Secure Software Development
Chapter 19: Disaster Recovery, Business Continuity, and
Organizational Policies
Chapter 20: Risk Management
Chapter 21: Change Management
Chapter 22: Incident Response
Chapter 23: Computer Forensics
Chapter 24: Legal Issues and Ethics
Chapter 25: Privacy
App A Objective Map
App B About the CD-ROM
Glossary
Index
Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant
Professor in the Information and Logistics Technology department at
the University of Houston. In addition to his PhD, Mr. Conklin has
a MBA from UTSA, and two graduate degrees in Electrical Engineering
from the Naval Postgraduate School in Monterey, California. Dr.
Conklin’s interests are information security, systems theory, and
secure software design. Greg White (San Antonio, TX), CompTIA
Security+, CISSP, is an Associate Professor in the Department of
Computer Science at the University of Texas at San Antonio. Dr.
White is the Director of the Center for Infrastructure Assurance
and Security at UTSA.
Chuck Cothren is a Research Scientist at University of Texas at San
Antonio (UTSA) Center for Infrastructure Assurance and Security
(CIAS) and currently serves on the
Information Security Association’s Alamo Chapter Board of
Directors. Mr. Cothren has a wide array of security experience
including performing controlled penetration testing, network
security policies, computer intrusion
forensics, and computer training. He is a Certified Information
Systems Security Professional (CISSP) and has co-authored other
McGraw-Hill/Osborne titles. Mr. Cothren holds a B.S. in Industrial
Distribution from Texas A&M University. Roger L. Davis is a
Senior Internal Audit Manager at NuSkin
Enterprises and is responsible for evaluating global business
operations in over 35 countries. He is a retired Air Force Colonel
with over 20 years of military and information security experience.
Mr. Davis is a Certified
Information Systems Security Professional (CISSP) and holds a
Master’s Degree in Computer Science from George Washington
University.
Ask a Question About this Product More... |