Table of contents : Cover Page Security 3 Introduction Chapter 1 Secure Networking Protocols Chapter 2 Host or Application Security Solutions Chapter 3 Coding, Fuzzing & Quality Testing Chapter 4 How to Implement Secure Network Designs Chapter 5 Network Access Control, Port Security & Loop Protection Chapter 6 Spanning Tree, DHCP Snooping & MAC Filtering Chapter 7 Access Control Lists & Route Security Chapter 8 Intrusion Detection and Prevention Chapter 9 Firewalls & Unified Threat Management Chapter 10 How to Install and Configure Wireless Security Chapter 11 How to Implement Secure Mobile Solutions Chapter 12 Geo-tagging & Context-Aware Authentication Chapter 13 How to Apply Cybersecurity Solutions to the Cloud Chapter 14 How to Implement Identity and Account Management Controls Chapter 15 How to Implement Authentication and Authorization Solutions Chapter 16 How to Implement Public Key Infrastructure Conclusion About Richie Miller