Introduction
1 Introduction to Computer Security
2 Networks and the Internet
3 Cyber Stalking, Fraud, and Abuse
4 Denial of Service Attacks
5 Malware
6 Techniques Used by Hackers
7 Industrial Espionage in Cyberspace
8 Encryption
9 Computer Security Technology
10 Security Policies
11 Network Scanning and Vulnerability Scanning
12 Cyber Terrorism and Information Warfare
13 Cyber Detective
14 Introduction to Forensics
15 Cybersecurity Engineering
Glossary
Appendix A: Resources
Appendix B: Answers to the Multiple Choice Questions
Index