Post date: Dec 18, 2014 10:19:5 AM
Chapter 6: Physical and Environmental Security
The Planning Process
Protection Assets
Internal Support Systems
Chapter 11: Application Security
Software Importance
Where Do We Place the Security?
Malicious software (Malware)
Viruses
Worms
Logic Bombs
Trojan Horses