The book is divided in four major parts cryptography, access control, protocols, and software. In each section, the author maintains a realistic focus by including real-world examples to illustrate key points. A must buy book beginners. Concepts are explained in a very simple manner.