O'Reilly logo

Defend I.T.: Security by Example by Scott Laliberte, Ajay Gupta

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix . Conclusion

Further Investigations

In the Introduction we said that this book, this collection of case studies, would be like a tour of many of the issues that a cyber security professional must be prepared to face. Any such tour, while valuable and entertaining, is restricted to showing only part of the overall picture.

In this Conclusion we will briefly talk about some of the other topics that come up in security and must be at least understood by the well-rounded security professional. Again, we had to make choices about what to include and what not to include,[1] and after a few knock-down, drag-out fights, the following topics were selected:

  • Public key infrastructure

  • Identity management

  • Single sign-on

  • Biometrics

  • Secure architecture

  • Firewalls ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required