Information Technology Security. Advice from Experts
Chapter II: Aligning Assurance Requirements, Countermeasures, and Business
- Figure 1
- Figure 2
- Figure 3
Chapter IV: Global IT Risk Management Strategies
- Figure 1
- Figure 2
- Figure 3
Chapter VI: Wireless Information Security
- Figure 1: Basic and Extended Service Sets
- Figure 2: Notional Wireless Network
- Figure 3: Challenge and Response Handshake
- Figure 4: War Chalking Symbols Card (http://www.warchalking.org/story/2002/8/20/17730/3808 )
- Figure 5: 802.11b Wireless Security