1. Access controls / Paul Henry -- 2. Cryptography / Christopher M. Nowell -- 3. Malicious code / Ken Dunham -- 4. Monitoring and analysis / Mike Mackrill -- 5. Networks and telecommunications / Eric Waxvik and Samuel Chun -- 6. Security operations and administration / C. Karen Stopford -- 7. Risk, response, and recovery / Chris Trautwein.