August 2018
Intermediate to advanced
512 pages
17h 18m
English
• 2.2 The Cybersecurity Trade-off: Performance and Functionality
• 2.2.6 Quantity of Service or Product
• 2.2.7 Quality of Service or Product
• 2.2.8 Cost of Service or Product
• 2.3 Theories of Security Come from Theories of Insecurity
• 2.4 They Come at You Through the Weeds
• 2.5 Top-Down Meets Bottom-Up
• 2.6 Cybersecurity Is a Live Orchestra, Not a Recorded Instrument
• Learn that the primary metric of cybersecurity is risk and its components.
• Understand the trade-off ...