CONTENTS
PART - I : ESTABLISH A FOUNDATION
CHAPTER - 1 : WIRELESS TECHNOLOGIES
CHAPTER - 2 : SECURITY PRINCIPLES
PART - II : KNOW YOUR SYSTEM
CHAPTER - 3 : TECHNOLOGIES
CHAPTER - 4 : DEVICES
CHAPTER - 5 : LANGUAGES
PART - III : PROTECT YOUR SYSTEM
CHAPTER - 6 : CRYPTOGRAPHY
CHAPTER - 7 : COTS
CHAPTER - 8 : PRIVACY
PART - IV : I-ADD
CHAPTER - 9 : IDENTIFY TARGETS AND ROLES
CHAPTER - 10 : ANALYZE ATTACKS AND VULNERABILITIES
CHAPTER - 11 : ANALYZE MITIGATIONS AND PROTECTIONS
CHAPTER - 12 : DEFINE AND DESIGN
DOWNLOAD LINK
https://drive.google.com/file/d/0BxCGwQIReqoMdlRVUS1LbXF0V0k/edit?usp=sharing
No comments:
Post a Comment