Get full access to Information Technology Security Fundamentals and 60K+ other titles, with free 10-day trial of O'Reilly.
There's also live online events, interactive content, certification prep materials, and more.
Chapter 1: Security and Information Assurance
Information assurance and security in the enterprise
Physical asset protection
Chapter 2: Operating System Security
What is the threat landscape?
How can a machine be attacked?
Servers in the CIA model
Specifics for different operating systems
Open source operating systems
Threat model for desktops: disgruntled or careless users
Chapter 3: Data Security: Protecting Your Information
Cost of a breach
Internal versus external
DBMS security features
Types of database threats
Data quality aspects of information assurance
Master data management ...
Get Information Technology Security Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.
Get Mark Richards’s Software Architecture Patterns ebook to better understand how to design components—and how they should interact.