From the Book - First edition.
Motivation and security definitions
Deception. Deception strategies : networks, organization, and structures ; Deception strategies : defensive technologies
Frustration. Frustration strategies : technical controls ; Frustration strategies : formal verification
Resistance. Resistance strategies : authentication and permissions ; Resistance strategies : symmetric encryption ; Resistance strategies : partitioning and need to know ; Change management
Recognition/recovery. Network analysis and forensics ; Recognition strategies : intrusion detection and prevention ; Digital forensics ; Recognition strategies : integrity detection ; Recovery of security ; Professional certifications and overall conclusions.