Part I Threats, Attacks, and Vulnerabilities Chapter 1 Social Engineering Techniques Chapter 2 Types of Attack Indicators Chapter 3 Application Attack Indicators Chapter 4 Network Attack Indicators Chapter 5 Threat Actors, Vectors, and Intelligence Sources Chapter 6 Vulnerabilities Chapter 7 Security Assessments Chapter 8 Penetration Testing Part II Architecture and Design Chapter 9 Enterprise Architecture Chapter 10 Virtualization and Cloud Security Chapter 11 Secure App Development, Deployment, and Automation Scripts Chapter 12 Authentication and Authorization Chapter 13 Cybersecurity Resilience Chapter 14 Embedded and Specialized Systems Chapter 15 Physical Security Chapter 16 Cryptographic Concepts Part III Implementation Chapter 17 Secure Protocols Chapter 18 Host and Application Security Chapter 19 Secure Network Design Chapter 20 Wireless Security Chapter 21 Secure Mobile Solutions Chapter 22 Implementing Cloud Security Chapter 23 Identity and Account Management Controls Chapter 24 Implementing Authentication and Authorization Chapter 25 Public Key Infrastructure Part IV Operations and Incident Response Chapter 26 Tools/Assess Organizational Security Chapter 27 Incident Response Policies and Procedures Chapter 28 Investigations Chapter 29 Mitigation Techniques and Controls Chapter 30 Digital Forensics Part V Governance, Risk, and Compliance Chapter 31 Security Controls Chapter 32 Regulations, Standards, and Frameworks Chapter 33 Organizational Policies Chapter 34 Risk Management Chapter 35 Privacy
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Please wait while the item is added to your bag...
×
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description,
with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.