Cargando…

Security without obscurity : a guide to confidentiality, authentication, and integrity /

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Stapleton, Jeffrey James (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : Auerbach, 2014.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn880773253
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 140620s2014 flua ob 001 0 eng d
040 |a UKMGB  |b eng  |e pn  |c UKMGB  |d OCLCO  |d OCLCF  |d EBLCP  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d MERUC  |d OCLCQ  |d OCLCA  |d UKMGB  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO 
015 |a GBB463360  |2 bnb 
016 7 |a 016747611  |2 Uk 
016 7 |a 016727623  |2 Uk 
019 |a 879550891 
020 |a 9781466592155  |q (PDF ebook) 
020 |a 146659215X  |q (PDF ebook) 
020 |z 9781466592148  |q (hbk.) 
029 1 |a DEBBG  |b BV043606833 
029 1 |a DEBSZ  |b 431554374 
029 1 |a DEBSZ  |b 463014987 
029 1 |a UKMGB  |b 016747611 
035 |a (OCoLC)880773253  |z (OCoLC)879550891 
037 |a TANDF_306841  |b Ingram Content Group 
050 4 |a QA76.9.A25 S734 2014 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Stapleton, Jeffrey James,  |e author. 
245 1 0 |a Security without obscurity :  |b a guide to confidentiality, authentication, and integrity /  |c Jeffrey James Stapleton. 
264 1 |a Boca Raton :  |b Auerbach,  |c 2014. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
336 |a still image  |b sti  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a CIP data; item not viewed. 
505 0 |a Front Cover; Contents; About the Author; Chapter 1: Introduction; Chapter 2: Confidentiality; Chapter 3: Authentication; Chapter 4: Integrity; Chapter 5: Nonrepudiation; Chapter 6: Privacy; Chapter 7: Key Management; Bibliography; Back Cover. 
520 |a The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Data protection  |x Standards. 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Protection de l'information (Informatique)  |v Normes. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique)  |x Normes. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |x Standards  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
776 0 8 |i Print version  |z 9781466592148 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781466592155/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1538312 
994 |a 92  |b IZTAP