Skip to main content

Security Analysis Text: Accessibility Statement

Security Analysis Text
Accessibility Statement
  • Show the following:

    Annotations
    Resources
  • Adjust appearance:

    Font
    Font style
    Color Scheme
    Light
    Dark
    Annotation contrast
    Low
    High
    Margins
  • Search within:
    • Notifications
    • Privacy
  • Project HomeSecurity Analysis
  • Projects
  • Learn more about Manifold

Notes

table of contents
  1. Preface and Introductory Materials
  2. Accessibility Statement
  3. Chapter 1 Introducing Security Analysis
  4. Chapter 2 Why a Critical-Thinking Framework?
  5. Chapter 3 Foundations of Security Analysis
  6. Chapter 4 Purpose and Questions
  7. Chapter 5 Information and Context
  8. Chapter 6 Points of View and Assumptions
  9. Chapter 7 Conceptualizing the Problem
  10. Chapter 8 Alternatives
  11. Chapter 9 Interpretation and Inferences
  12. Chapter 10 Implications and Consequences
  13. Chapter 11 Written Reports and Verbal Briefings
  14. Appendix I Informal Logic Fallacies
  15. Appendix II Heuristics and Cognitive Biases
  16. Appendix III Analyzing Political Culture

Accessibility Statement

Eastern Kentucky University Libraries is dedicated to making OER publications as accessible as possible. Images in this resource have alternative text and heading styles are used throughout for compatibility with screen readers.

This ebook is displayed in the software Manifold; detailed documentation is available regarding Manifold’s accessibility commitment and features.

Multiple formats are provided, including online ebook, PDF, and epub to allow for offline use and use with various accessibility software. The open licensing of this work allows for translation and changing formats as needed for any user, without additional permissions needed, as long as proper attribution is given and the work license is followed.

If you have any requests for alternative formats or suggestions for improving the accessibility of this OER, please contact Open Strategies Librarian Bailey Lake at bailey.lake@eku.edu.

Annotate

Next Chapter
Chapter 1 Introducing Security Analysis
PreviousNext
Powered by Manifold Scholarship. Learn more at
Opens in new tab or windowmanifoldapp.org