Part 1 Introduction to information security: information security vs. information assurance; the business case for information security; managing information security and technology risk. Part 2 The information security environment: organizing the corporate security structure; addressing network security issues; securing individual systems; ensuring data security. Part 3 Operating system-specific recommendations: securing a Microsoft Windows environment; securing UNIX-variants and Linux environments; appendices.