Table of Contents
Chapter 1: Computer Security Introduction and Review
Access Control and the Origins of Computer Security Theory
Data Integrity and Authentication
Chapter 2: Network Communications Protocols and Built-in Security
Transport and Internet Layer Protocols
Wrap-Up: Network Communications
Chapter 3: Security Protocols and Algorithms
Standardizing Security—A Brief History
Standardized Security in Practice
Get Practical Embedded Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.