Information Technology Security. Advice from Experts

Chapter II: Aligning Assurance Requirements, Countermeasures, and Business

Figure 1
Figure 2
Figure 3

Chapter IV: Global IT Risk Management Strategies

Figure 1
Figure 2
Figure 3

Chapter VI: Wireless Information Security

Figure 1: Basic and Extended Service Sets
Figure 2: Notional Wireless Network
Figure 3: Challenge and Response Handshake
Figure 4: War Chalking Symbols Card (http://www.warchalking.org/story/2002/8/20/17730/3808 )
Figure 5: 802.11b Wireless Security

Категории