Provides case studies about international hackers; covers basic security precautions including Data Integrity, Encryption, and Authentication; and discusses such in-depth tools as Application Gateways and Security APIs. Original. (All Users).
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzes reviews to verify trustworthiness.
Top reviews
Top review from the United States
There was a problem filtering reviews right now. Please try again later.
This was one of the earliest books focused entirely on Internet Security. It was SANS Institute "top 10" recommended reading 5 years after it went out of print. The author's current website is [...]