Appendix . Conclusion
Further Investigations
In the Introduction we said that this book, this collection of case studies, would be like a tour of many of the issues that a cyber security professional must be prepared to face. Any such tour, while valuable and entertaining, is restricted to showing only part of the overall picture.
In this Conclusion we will briefly talk about some of the other topics that come up in security and must be at least understood by the well-rounded security professional. Again, we had to make choices about what to include and what not to include,[1] and after a few knock-down, drag-out fights, the following topics were selected:
Public key infrastructure
Identity management
Single sign-on
Biometrics
Secure architecture
Firewalls ...
Get Defend I.T.: Security by Example now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.