List of Figures
Figure 1.1: | Classification of information security analysts |
Figure 1.2: | Time-consuming activities for information security professionals |
Figure 1.3: | Training needs identified by information security professionals |
Figure 1.4: | ILOVEYOU virus |
Figure 1.5: | T.J. Maxx |
Figure 1.6: | Defaced Georgian foreign ministry website |
Figure 1.7: | Google-China offices |
Figure 1.8: | Online Software Inspector |
Figure 1.9: | PC audit report |
Figure 1.10: | Contents of Downloads folder for Steganography exercise |
Figure 1.11: | Commands to hide text files at the end of image files |
Figure 1.12: | Manipulated images among original images |
Figure 1.13: | Opening image files in Notepad |
Figure 1.14: | Secret message hidden at the end of the image file |
Figure 1.15: | Sunshine State University funding sources |
Figure 1.16: | Extract from the organization structure of Sunshine State University |
Figure 2.1: | Paul Ceglia |
Figure 2.2: | Windows desktop usage—April 2013 |
Figure 2.3: | System Center Operation Manager |
Figure 2.4: | Unix family tree |
Figure 2.5: | Albert Gonzalez, at the time of his indictment in August 2009 |
Figure 2.6: | T J Maxx sales (2005–2010) |
Figure 2.7: | Virtual machine structure |
Figure 2.8: | VirtualBox download page |
Figure 2.9: | VirtualBox installer welcome screen |
Figure 2.10: | Default install Location |
Figure 2.11: | VirtualBox install confirmation |
Figure 2.12: | VirtualBox ... |
Get Information Security and IT Risk Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.