Home Page Icon
Home Page
Table of Contents for
Back cover
Close
Back cover
by Eric Oksendahl, Bill Stackpole
Security Strategy
Front cover
Dedication
Contents (1/2)
Contents (2/2)
Acknowledgments
Introduction
Preface
Authors
Section I. STRATEGY
Chapter 1. Strategy: An Introduction (1/3)
Chapter 1. Strategy: An Introduction (2/3)
Chapter 1. Strategy: An Introduction (3/3)
Chapter 2. Getting to the Big Picture (1/5)
Chapter 2. Getting to the Big Picture (2/5)
Chapter 2. Getting to the Big Picture (3/5)
Chapter 2. Getting to the Big Picture (4/5)
Chapter 2. Getting to the Big Picture (5/5)
Chapter 3. Testing the Consumer (1/3)
Chapter 3. Testing the Consumer (2/3)
Chapter 3. Testing the Consumer (3/3)
Chapter 4. Strategic Framework (Inputs to Strategic Planning) (1/4)
Chapter 4. Strategic Framework (Inputs to Strategic Planning) (2/4)
Chapter 4. Strategic Framework (Inputs to Strategic Planning) (3/4)
Chapter 4. Strategic Framework (Inputs to Strategic Planning) (4/4)
Chapter 5. Developing a Strategic Planning Process (1/4)
Chapter 5. Developing a Strategic Planning Process (2/4)
Chapter 5. Developing a Strategic Planning Process (3/4)
Chapter 5. Developing a Strategic Planning Process (4/4)
Chapter 6. Gates, Geeks, and Guards (Security Convergence) (1/2)
Chapter 6. Gates, Geeks, and Guards (Security Convergence) (2/2)
Section II. TACTICS
Chapter 7. Tactics: An Introduction (1/4)
Chapter 7. Tactics: An Introduction (2/4)
Chapter 7. Tactics: An Introduction (3/4)
Chapter 7. Tactics: An Introduction (4/4)
Chapter 8. Layer upon Layer (Defense in Depth) (1/5)
Chapter 8. Layer upon Layer (Defense in Depth) (2/5)
Chapter 8. Layer upon Layer (Defense in Depth) (3/5)
Chapter 8. Layer upon Layer (Defense in Depth) (4/5)
Chapter 8. Layer upon Layer (Defense in Depth) (5/5)
Chapter 9. Did You See That! (Observation) (1/6)
Chapter 9. Did You See That! (Observation) (2/6)
Chapter 9. Did You See That! (Observation) (3/6)
Chapter 9. Did You See That! (Observation) (4/6)
Chapter 9. Did You See That! (Observation) (5/6)
Chapter 9. Did You See That! (Observation) (6/6)
Chapter 10. Trust but Verify (Accountability) (1/4)
Chapter 10. Trust but Verify (Accountability) (2/4)
Chapter 10. Trust but Verify (Accountability) (3/4)
Chapter 10. Trust but Verify (Accountability) (4/4)
Chapter 11. SDL and Incident Response (1/8)
Chapter 11. SDL and Incident Response (2/8)
Chapter 11. SDL and Incident Response (3/8)
Chapter 11. SDL and Incident Response (4/8)
Chapter 11. SDL and Incident Response (5/8)
Chapter 11. SDL and Incident Response (6/8)
Chapter 11. SDL and Incident Response (7/8)
Chapter 11. SDL and Incident Response (8/8)
Chapter 12. Keep Your Enemies Closer (1/6)
Chapter 12. Keep Your Enemies Closer (2/6)
Chapter 12. Keep Your Enemies Closer (3/6)
Chapter 12. Keep Your Enemies Closer (4/6)
Chapter 12. Keep Your Enemies Closer (5/6)
Chapter 12. Keep Your Enemies Closer (6/6)
Chapter 13. Hire a Hessian (Outsourcing) (1/5)
Chapter 13. Hire a Hessian (Outsourcing) (2/5)
Chapter 13. Hire a Hessian (Outsourcing) (3/5)
Chapter 13. Hire a Hessian (Outsourcing) (4/5)
Chapter 13. Hire a Hessian (Outsourcing) (5/5)
Chapter 14. Security Awareness Training (1/4)
Chapter 14. Security Awareness Training (2/4)
Chapter 14. Security Awareness Training (3/4)
Chapter 14. Security Awareness Training (4/4)
References (1/2)
References (2/2)
Appendix (1/2)
Appendix (2/2)
Index (1/2)
Index (2/2)
Back cover
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Index (2/2)
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset