附註:1. Building a Foundation for Information Security -- 2. The Fundamental Elements of Security -- 3. Vulnerabilities to Internet-Attached Networks -- 4. Hacking Isn't beyond the Corporate Perimeter -- 5. Peeking inside a Hacker's Toolbox -- 6. Instrumental Effects for Security Assurance -- 7. Security Technologies -- 8. Physical Security Control -- 9. Logical Access Control -- 10. Application Layer Security -- 11. An Introduction to Cryptography -- 12. Transport Layer Cryptography -- 13. Digital Signatures and PPK Cryptography -- 14. Key Management Considerations -- 15. Multifactor Access Controls Using Cryptography -- 16. Minding the Store for the Long Run -- App. A.A Sample Internet Security Policy -- App. B. Internet Bookmarks to Security-Related Sites -- App. C. Security and Security-Testing Specialists.
Includes bibliographical references (pages 318-326) and index.