Security without obscurity : a guide to confidentiality, authentication, and integrity /
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton :
Auerbach,
2014.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn880773253 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 140620s2014 flua ob 001 0 eng d | ||
040 | |a UKMGB |b eng |e pn |c UKMGB |d OCLCO |d OCLCF |d EBLCP |d DEBSZ |d OCLCO |d OCLCQ |d OCLCO |d MERUC |d OCLCQ |d OCLCA |d UKMGB |d OCLCQ |d OCLCO |d K6U |d OCLCQ |d OCLCO |d OCLCL | ||
015 | |a GBB463360 |2 bnb | ||
016 | 7 | |a 016747611 |2 Uk | |
016 | 7 | |a 016727623 |2 Uk | |
019 | |a 879550891 | ||
020 | |a 9781466592155 |q (PDF ebook) | ||
020 | |a 146659215X |q (PDF ebook) | ||
020 | |z 9781466592148 |q (hbk.) | ||
029 | 1 | |a DEBBG |b BV043606833 | |
029 | 1 | |a DEBSZ |b 431554374 | |
029 | 1 | |a DEBSZ |b 463014987 | |
029 | 1 | |a UKMGB |b 016747611 | |
035 | |a (OCoLC)880773253 |z (OCoLC)879550891 | ||
037 | |a TANDF_306841 |b Ingram Content Group | ||
050 | 4 | |a QA76.9.A25 S734 2014 | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Stapleton, Jeffrey James, |e author. | |
245 | 1 | 0 | |a Security without obscurity : |b a guide to confidentiality, authentication, and integrity / |c Jeffrey James Stapleton. |
264 | 1 | |a Boca Raton : |b Auerbach, |c 2014. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
336 | |a still image |b sti |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a CIP data; item not viewed. | |
505 | 0 | |a Front Cover; Contents; About the Author; Chapter 1: Introduction; Chapter 2: Confidentiality; Chapter 3: Authentication; Chapter 4: Integrity; Chapter 5: Nonrepudiation; Chapter 6: Privacy; Chapter 7: Key Management; Bibliography; Back Cover. | |
520 | |a The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Data protection |x Standards. | |
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Protection de l'information (Informatique) |v Normes. | |
650 | 6 | |a Technologie de l'information |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Protection de l'information (Informatique) |x Normes. | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |x Standards |2 fast | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
758 | |i has work: |a Security without obscurity (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFwdfbwqXQc6T3pxpvwGMd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version |z 9781466592148 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781466592155/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1538312 |z Texto completo |
936 | |a BATCHLOAD | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1538312 | ||
994 | |a 92 |b IZTAP |