Part I Network Security Chapter 1 Network Device Configuration Chapter 2 Secure Network Administration Chapter 3 Secure Network Design Chapter 4 Secure Wireless Networking Part II Compliance and Operational Security Chapter 5 Risk Concepts Chapter 6 System Integration Processes Chapter 7 Risk Management Chapter 8 Digital Forensics and Incident Response Chapter 9 Security Awareness and Training Chapter 10 Physical Security and Environmental Controls Chapter 11 Security Controls Part III Threats and Vulnerabilities Chapter 12 Attacks and Malware Chapter 13 Social Engineering Chapter 14 Application and Wireless Attacks Chapter 15 Mitigation Techniques Chapter 16 Threat and Vulnerability Discovery Part IV Application, Data, and Host Security Chapter 17 Application Security Controls Chapter 18 Mobile Device Security Chapter 19 Host-based Security Chapter 20 Securing Alternative Environments Part V Access Control and Identity Management Chapter 21 Access Control and Identity Management Chapter 22 Account Management Part VI Cryptography Chapter 23 Cryptographic Concepts Chapter 24 Cryptographic Methods Appendices and Glossary Appendix A OSI Model and Internet Protocols Appendix B About the CD Glossary Index
Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklins interests are information security, systems theory, and secure software design. Chuck Cothren is a Research Scientist at University of Texas at San Antonio (UTSA) Center for Infrastructure Assurance and Security (CIAS) and currently serves on the Information Security Associations Alamo Chapter Board of Directors. Mr. Cothren has a wide array of security experience including performing controlled penetration testing, network security policies, computer intrusion forensics, and computer training. He is a Certified Information Systems Security Professional (CISSP) and has co-authored other McGraw-Hill/Osborne titles. Mr. Cothren holds a B.S. in Industrial Distribution from Texas A&M University. Roger L. Davis is a Senior Internal Audit Manager at NuSkin Enterprises and is responsible for evaluating global business operations in over 35 countries. He is a retired Air Force Colonel with over 20 years of military and information security experience. Mr. Davis is a Certified Information Systems Security Professional (CISSP) and holds a Masters Degree in Computer Science from George Washington University. Greg White (San Antonio, TX), CompTIA Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA.