Chapter 1: Introduction
Chapter 2: A Hacker is Made
Chapter 3: Preparation and Planning
Chapter 4: International Laws and Standards
Chapter 5: Passwords and Beyond
Chapter 6: Your Information Security Policy
Chapter 7: Security Awareness Training
Chapter 8: Patch Management
Chapter 9: Windows Workstation Security
Chapter 10: Basic Server Security
Chapter 11: Understanding Firewalls
Chapter 12: Protecting Your Web Site
Chapter 13: Wireless Networking
Chapter 14: Penetration Testing
Chapter 15: Security Through Obscurity
Chapter 16: Windows Vista
Chapter 17: Email
Chapter 18: The Curse of Spam
Chapter 19: Viruses
Chapter 20: Spyware, Adware and Rogue Diallers
Chapter 21: Piracy
Chapter 22: File Sharing and ‘P2P’
Chapter 23: Backups and Archives
Chapter 24: Preventing Internet Misuse
Chapter 25: Document Security
Chapter 26: Data Theft
Chapter 27: Encryption
Chapter 28: Employees’ Own Computers
Chapter 29: How Hackers Use Search Engines
Chapter 30: Denial of Service Attacks
Chapter 31: Provisioning and Identity Management
Chapter 32: Data Interception
Chapter 33: Out of the Office
Chapter 34: Social Engineering
Chapter 35: E-Commerce Fraud
Chapter 36: Intrusion Detection Systems
Chapter 37: Outsourcing
Chapter 38: Securing your Premises
Chapter 39: Forensics
Chapter 40: Planning for the Worst
Chapter 41: Hardware Theft
Chapter 42: Let’s Be Careful Out There
Index