2. Toolbox: Authentication, Access Control, and Cryptography
Just as doctors have stethoscopes and blood tests, and carpenters have measuring tapes and squares, security professionals have a set of tools they use frequently. Three key security tools are authentication, access control, and cryptography. In this chapter we introduce these tools, discussing what they are and how they work. In later chapters we use these tools ...
Get Security in Computing, 6th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.