"The purpose of this book is primarily to develop a strategic method of thinking about information security.
- Chapter s 1 and 2 motivate the strategic approach and define security-related terms.
- Chapter s 3-15 are organized around a certain type of contribution to a strategic area. The four strategic stages developed are deception, frustration, resistance, and recognition/recovery. The chapter topics are summarized in Table I.1. As each strategy builds on the prior strategies, the most natural way for a reader interested in strategy to proceed is sequentially, perhaps skimming over some of the technical details"-- Provided by publisher.
Includes bibliographical references and index.