Contents
Chapter 1: Security and Information Assurance
Information assurance and security in the enterprise
Chapter 2: Operating System Security
How can a machine be attacked?
Specifics for different operating systems
Threat model for desktops: disgruntled or careless users
Chapter 3: Data Security: Protecting Your Information
Get Information Technology Security Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.