CONTENTS
Chapter 1 Security from the Ground Up
1.1.1 Making Security Decisions
1.1.3 Continuous Improvement: A Basic Principle
1.2 Process Example: Bob’s Computer
1.3 Assets and Risk Assessment
1.3.4 Risk Assessment Overview
1.4.2 Security Properties, Services, and Attacks
1.5.1 Example: Risks to Alice’s Laptop
1.5.2 Other Risk-Assessment Processes
1.6 Ethical Issues in Security Analysis
1.6.1 Searching for Vulnerabilities
Get Elementary Information Security now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.