This title has been fully updated to provide a comprehensive guide to identifying man-made threats to an organization, determining the vulnerabilities to those threats, specifying security upgrades to mitigate those threats, and acquiring and implementing recommended solutions.