Contents
Chapter 1: Security and Information Assurance
Information assurance and security in the enterprise
Chapter 2: Operating System Security
How can a machine be attacked?
Specifics for different operating systems
Threat model for desktops: disgruntled or careless users
Chapter 3: Data Security: Protecting Your Information
Get Information Technology Security Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.