Defensive strategies; security protocols; SSL, SHTTP, SET; encryption techniques; viruses and trojan horses; developing and implementing security policies; network and routers; firewalls; user accounts management, authentication, directory permissions; logging and auditing; tools of the trade Packet Analyzers and other monitoring tools, crack (password encryption programs); electronic commerce, security for business transactions; resources - hacker users groups, security forms.