Description |
1 online resource |
Bibliography |
Includes bibliographical references and index. |
Contents |
Front Cover; Contents; About the Author; Chapter 1: Introduction; Chapter 2: Confidentiality; Chapter 3: Authentication; Chapter 4: Integrity; Chapter 5: Nonrepudiation; Chapter 6: Privacy; Chapter 7: Key Management; Bibliography; Back Cover. |
Summary |
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, |
Subject |
Data protection -- Standards.
|
|
Information technology -- Security measures.
|
|
Computer security.
|
|
Computer networks -- Security measures.
|
|
Computer Security |
|
Protection de l'information (Informatique) -- Normes. |
|
Technologie de l'information -- Sécurité -- Mesures. |
|
Sécurité informatique. |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Protection de l'information (Informatique) -- Normes. |
|
Computer networks -- Security measures |
|
Computer security |
|
Data protection -- Standards |
|
Information technology -- Security measures |
Other Form: |
Print version 9781466592148 |
ISBN |
9781466592155 (PDF ebook) |
|
146659215X (PDF ebook) |
|
(hbk.) |
|