I've started reading the book "Introduction to Computer Security" by Matt Bishop a few weeks back. Matt Bishop is the Security teacher at UC Davis (my college) so I thought I'd get a head start on the class before I take it in a few quarters.

Reading through all this theoretical stuff I've started to wonder exactly how applicable it is in the real world. Though I definately plan on learning the stuff well, if only because I may choose to go to graduate school, I was wondering if anyone outside of an educational atmosphere actually uses this kind of stuff.

A nice little excerpt for your reading pleasure:

This kinda stuff, sets, and mathematical algorithms is the majority of the book so far.

I'm four chapters in, and I see the importance of a lot of the ideas, I just really can't see the use of the math in the real world. Any enlightening thoughts?

Reading through all this theoretical stuff I've started to wonder exactly how applicable it is in the real world. Though I definately plan on learning the stuff well, if only because I may choose to go to graduate school, I was wondering if anyone outside of an educational atmosphere actually uses this kind of stuff.

A nice little excerpt for your reading pleasure:

*Let a computer system begin in protection state s0. If a system can never leak the right r, the system (including the initial state s0) is called safe with respect to the right r. If the system can leak the right r (enter an unauthorized state), it is called unsafe with respect to the right r.*This kinda stuff, sets, and mathematical algorithms is the majority of the book so far.

I'm four chapters in, and I see the importance of a lot of the ideas, I just really can't see the use of the math in the real world. Any enlightening thoughts?

## Comment