A completely up-to-date resource on computer security
Packed with in-depth coverage, this resource spares no details when it comes to the critical topic of computer security.
What people are saying - Write a review
Informative but complex. I enjoyed how the book provided real world examples in many of the chapters, but its matter-of-fact approach to some of the concepts was infuriating. In some of the later chapters, mathematical concepts are used to explain how something works, but they are presented in a mind boggling fashion. In most cases, the formulas are not provided with any context, but inserted into paragraphs as if they were plain English. "After <complex formula here> normal encryption resumes." "Due to <another complex formula> you can see both parties establish encryption."
No, I don't see, and no explanation is ever given as to the deeper meaning of these concepts. It was extremely frustrating to say the least.
CHAPTER3 Foundations of Computer Security
CHAPTER4 Identiﬁcation and Authentication
CHAPTER5 Access Control
CHAPTER16 Communications Security
CHAPTER 20 New Access Control Paradigms