In this chapter you will
• Learn basic technologies employed to provide for information security
• Discover the basic approaches to authentication and identity management
• Examine security models used to implement security in systems
• Explore the types of adversaries associated with software security
Technologies are one of the driving forces behind software. New technology is rare without a software element. And software uses specific technology to achieve its security objectives. This chapter will examine some of the basic ...