The remainder of the book looks at architectural constructs for various aspects of the IT environment that may be subject to security infractions. Chapter 4 looks at the physical/electromagnetic radiation control function. Chapter 5 looks at perimeters defenses, specifically credential/access verification functions. Chapter 6 examines administrative internally-connected function & privilege levels. This is follows by a discussion of the application defenses Function (Chapter 7); OS defenses functions are covered in Chapter 8. Finally Chapter 9 looks at data and data-at-rest Functions.
This text book is intended for security professionals at all levels in medium-to-large size companies. It is expected to also be useful to Enterprise Architects, vendors, auditors, and students in the IT field.