PART II
Securing Local Hosts
Chapter 6 | Local Host Security in the Real World |
Chapter 7 | Securing Devices |
Chapter 8 | Protecting the Inner Perimeter |
Chapter 9 | Protecting Remote Access |
Chapter 10 | Local Host Security: Review Questions & Hands-On Exercises |