If you are interested in cryptography, we recommend that you read, at least the first twenty pages. There you can find such methods and phenomena as espionage, authentication, denial of service, impersonalization, data hiding, masquerading, role-based authentication (as well as ad-hoc authentication), eavesdropping and data integrity system. And reading further, you can also see the planning for protection against theft and cryptography with a change of keys.
You can read
here (626k)
Overheard from here