In this chapter you will
•  Learn basic technologies employed to provide for information security
•  Discover the basic approaches to authentication and identity management
•  Examine security models used to implement security in systems
•  Explore the types of adversaries associated with software security
Technologies are one of the driving forces behind software. New technology is rare without a software element. And software uses specific technology to achieve its security objectives. This chapter will examine some of the basic ...

Get CSSLP Certification All-in-One Exam Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.