Table of Contents
Chapter 1. What is Information Security?
Models for discussing security
Information security in the real world
Chapter 2. Identification and Authentication
Identification and authentication in the real world
Get The Basics of Information Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.