Chapter 1: Using Digital Resources ResponsiblyChapter 2: What Are Vulnerabilities and Threats?Chapter 3: Controlling Access to Your AssetsChapter 4: Controlling Network ConnectionsChapter 5: Encrypting Your Data at RestChapter 6: Encrypting Your Moving DataChapter 7: Risk AssessmentChapter 8: Configuring System Backups and MonitoringChapter 9: Resource Isolation Design Patterns