Security without obscurity : a guide to confidentiality, authentication, and integrity /
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton :
Auerbach,
2014.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |