Linked e-resources
Details
Table of Contents
Introduction
Part I. The Infrastructure
1. Why IT Security Matters
2. Network Design
3. Firewalls
4. Distributed Denial of Service
5. Remote Connectivity
Part II. The Computers
6. Operating System Security
7. Multi-Factor Authentication
8. Zero Trust Environments
Part III. The People
9. Protection Against the Weakest Security Link
10. Employee Training.
Part I. The Infrastructure
1. Why IT Security Matters
2. Network Design
3. Firewalls
4. Distributed Denial of Service
5. Remote Connectivity
Part II. The Computers
6. Operating System Security
7. Multi-Factor Authentication
8. Zero Trust Environments
Part III. The People
9. Protection Against the Weakest Security Link
10. Employee Training.