Tabla de Contenidos:
  • Ch. 1. Hackers and threats
  • Ch. 2. Crucial need for security : vulnerabilities and attacks
  • Ch. 3. Security technology and related equipment
  • Ch. 4. Putting it all together : threats and security equipment
  • Ch. 5. Policy, personnel, and equipment as security enablers
  • Ch. 6. matter of governance : taking security to the board
  • Ch. 7. Creating demand for the security proposal : IT management's role
  • Ch. 8. Risk aversion and security topologies
  • Ch. 9. Return on prevention : investing in capital assets
  • Ch. 10. Essential elements of security policy development
  • Ch. 11. Security is a living process
  • App. OSI model, Internet protocol, and packets
  • App. Quick guides to security technologies
  • App. Return on prevention calculations reference sheets.