Security without obscurity : a guide to confidentiality, authentication, and integrity /
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Stapleton, Jeffrey James (Autor) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton :
Auerbach,
2014.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
Ejemplares similares
-
Security without obscurity : a guide to confidentiality, authentication, and integrity /
por: Stapleton, Jeffrey James
Publicado: (2014) -
Security without obscurity : a guide to PKI operations /
por: Stapleton, Jeffrey James
Publicado: (2015) -
Implementing the ISO/IEC 27001 ISMS standard /
por: Humphreys, Ted
Publicado: (2016) -
Iso/iec 27001 An Introduction to Information Security and the ISMS Standard.
por: Watkins, Steve
Publicado: (2022) -
PCI compliance : understand and implement effective PCI data security standard compliance /
por: Williams, Branden R., et al.
Publicado: (2015)