Contents: Chapter 1 Introduction to Security Chapter 2 Computer Systems Security Chapter 3 OS Hardening and Virtualization Chapter 4 Application Security Chapter 5 Network Design Elements and Network Threats Chapter 6 Network Perimeter Security Chapter 7 Securing Network Media and Devices Chapter 8 Physical Security and Authentication Models Chapter 9 Access Control Methods and …