| |
| |
| |
Foundations Of Computer Security | |
| |
| |
| |
Brief History and Mission of Information System Security | |
| |
| |
| |
| |
History of Computer Crime | |
| |
| |
| |
| |
Toward a New Framework for Information Security | |
| |
| |
| |
| |
Hardware Elements of Security | |
| |
| |
| |
| |
Data Communications and Information Security | |
| |
| |
| |
| |
Network Topologies, Protocols, and Design | |
| |
| |
| |
| |
Encryption | |
| |
| |
| |
| |
Using a Common Language for Computer Security Incident Information | |
| |
| |
| |
| |
Mathematical Models of Computer Security | |
| |
| |
| |
| |
Understanding Studies and Surveys of Computer Crime | |
| |
| |
| |
| |
Fundamentals of Intellectual Property Law | |
| |
| |
| |
| |
Threats And Vulnerabilities | |
| |
| |
| |
The Psychology of Computer Criminals | |
| |
| |
| |
| |
The Dangerous Information Technology Insider: Psychological Characteristics and Career Patterns | |
| |
| |
| |
| |
Information Warfare | |
| |
| |
| |
| |
Penetrating Computer Systems and Networks | |
| |
| |
| |
| |
Malicious Code | |
| |
| |
| |
| |
Mobile Code | |
| |
| |
| |
| |
Denial-of-Service Attacks | |
| |
| |
| |
| |
Social Engineering and Low-Tech Attacks | |
| |
| |
| |
| |
Spam, Phishing, and Trojans: Attacks Meant To Fool | |
| |
| |
| |
| |
Web-Based Vulnerabilities | |
| |
| |
| |
| |
Physical Threats to the Information Infrastructure | |
| |
| |
| |
| |
Prevention: Technical Defenses | |
| |
| |
| |
Protecting the Information Infrastructure | |
| |
| |
| |
| |
Operating System Security | |
| |
| |
| |
| |
Local Area Networks | |
| |
| |
| |
| |
Gateway Security Devices | |
| |
| |
| |
| |
Intrusion Detection and Intrusion Prevention Devices | |
| |
| |
| |
| |
Identification and Authentication | |
| |
| |
| |
| |
Biometric Authentication | |
| |
| |
| |
| |
E-Commerce and Web Server Safeguards | |
| |
| |
| |
| |
Web Monitoring and Content Filtering | |
| |
| |
| |
| |
Virtual Private Networks and Secure Remote Access | |
| |
| |
| |
| |
802.11 Wireless LAN Security | |
| |
| |
| |
| |
Securing VOIP | |
| |
| |
| |
| |
Securing P2P, IM, SMS, and Collaboration Tools | |
| |
| |
| |
| |
Securing Stored Data | |
| |
| |
| |
| |
PKI and Certificate Authorities | |
| |
| |
| |
| |
Writing Secure Code | |
| |
| |
| |
| |
Software Development and Quality Assurance | |
| |
| |
| |
| |
Managing Software Patches and Vulnerabilities | |
| |
| |
| |
| |
Antivirus Technology | |
| |
| |
| |
| |
Protecting Digital Rights: Technical Approaches | |
| |
| |
| |
| |
Prevention: Human Factors | |
| |
| |
| |
Ethical Decision Making and High Technology | |
| |