About the Book
Examining the emerging standards of security, addressing such topics as authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, and more, this text also presents numerous case studies as well as various applications.