No credit card required
Chapter 1: Security and Information Assurance
Information assurance and security in the enterprise
Physical asset protection
Chapter 2: Operating System Security
What is the threat landscape?
How can a machine be attacked?
Servers in the CIA model
Specifics for different operating systems
Open source operating systems
Threat model for desktops: disgruntled or careless users
Chapter 3: Data Security: Protecting Your Information
Cost of a breach
Internal versus external
DBMS security features
Types of database threats
Data quality aspects of information assurance
Master data management ...