| | | Copyright |
| | | Foreword |
| | | Acknowledgments |
| | | About the Author |
| | | Introduction |
| | | | About this Book |
| | | | How this Book Is Organized |
| | | | About Hackers |
|
| | | Chapter 1. Responding to Attacks |
| | | | Incident-Response Nightmare |
| | | | Let's Not Go There... |
| | | | Final Words |
|
| | | Chapter 2. Out-of-the-Box Security |
| | | | Deal with Security Later |
| | | | Let's Not Go There… |
| | | | Final Words |
|
| | | Chapter 3. Executive Support |
| | | | Executive Commitment |
| | | | Let's Not Go There… |
| | | | Final Words |
|
| | | Chapter 4. Network Access |
| | | | Partner Connections |
| | | | Let's Not Go There... |
| | | | Final Words |
|
| | | Chapter 5. Security Training |
| | | | Overlooking Training |
| | | | Let's Not Go There... |
| | | | Final Words |
|
| | | Chapter 6. Unplanned Security |
| | | | Transition Plan |
| | | | Let's Not Go There... |
| | | | Final Words |
|
| | | Chapter 7. Maintaining Security |
| | | | Responsible for Security |
| | | | Let's Not Go There... |
| | | | Final Words |
|
| | | Chapter 8. Internal Network Security |
| | | | Unsafe Network |
| | | | Let's Not Go There… |
| | | | Final Words |
|
| | | Chapter 9. Outsourcing Security |
| | | | Forget Security? |
| | | | Let's Not Go There… |
| | | | Final Words |
|
| | | Chapter 10. Unsecure Email |
| | | | Email or See Mail? |
| | | | Let's Not Go There... |
| | | | Final Words |
|
| | | Chapter 11. Looking Back: What's Next? |
| | | | Risking the Corporation |
| | | | Legal Duties to Protect Information and Networks |
| | | | Business Initiatives and Corporate Goals |
| | | | Threats Require Action |
|
| | | Chapter 12. A Hacker's Walk Through the Network |
| | | | A Hacker's Profile |
| | | | Walking with the Hacker |
| | | | What the Hacker Was Doing… |
| | | | Conclusion |
|
| | | Appendix A. People and Products to Know |
| | | | Security-Related Organizations |
| | | | Security Resources |
| | | | Security Vulnerability Archives |
| | | | Popular Mailing Lists |
| | | | Consulting Firms |
| | | | Security Crime Investigation |
| | | | Insuring Information Technology |
| | | | Software You Need to Know About |
| | | | Product Vendors |
|
| | | Acronyms |
| | | Glossary |