Dalpiaz et al. set out to address both students and practitioners with this book. Chapter 2 starts with a very high-level overview of computer and information security. The basic requirements-confidentiality, integrity, and availability-and composite requirements-authenticity, reliability, and accountability-are covered in a few paragraphs each. A few pages are dedicated to risk analysis and one section looks at security mechanisms. For an introductory chapter, it is acceptable, but one might argue that security mechanisms should be introduced only at a later stage.
展开▼