|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn880773253 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
140620s2014 flua ob 001 0 eng d |
040 |
|
|
|a UKMGB
|b eng
|e pn
|c UKMGB
|d OCLCO
|d OCLCF
|d EBLCP
|d DEBSZ
|d OCLCO
|d OCLCQ
|d OCLCO
|d MERUC
|d OCLCQ
|d OCLCA
|d UKMGB
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB463360
|2 bnb
|
016 |
7 |
|
|a 016747611
|2 Uk
|
016 |
7 |
|
|a 016727623
|2 Uk
|
019 |
|
|
|a 879550891
|
020 |
|
|
|a 9781466592155
|q (PDF ebook)
|
020 |
|
|
|a 146659215X
|q (PDF ebook)
|
020 |
|
|
|z 9781466592148
|q (hbk.)
|
029 |
1 |
|
|a DEBBG
|b BV043606833
|
029 |
1 |
|
|a DEBSZ
|b 431554374
|
029 |
1 |
|
|a DEBSZ
|b 463014987
|
029 |
1 |
|
|a UKMGB
|b 016747611
|
035 |
|
|
|a (OCoLC)880773253
|z (OCoLC)879550891
|
037 |
|
|
|a TANDF_306841
|b Ingram Content Group
|
050 |
|
4 |
|a QA76.9.A25 S734 2014
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Stapleton, Jeffrey James,
|e author.
|
245 |
1 |
0 |
|a Security without obscurity :
|b a guide to confidentiality, authentication, and integrity /
|c Jeffrey James Stapleton.
|
264 |
|
1 |
|a Boca Raton :
|b Auerbach,
|c 2014.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
336 |
|
|
|a still image
|b sti
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a CIP data; item not viewed.
|
505 |
0 |
|
|a Front Cover; Contents; About the Author; Chapter 1: Introduction; Chapter 2: Confidentiality; Chapter 3: Authentication; Chapter 4: Integrity; Chapter 5: Nonrepudiation; Chapter 6: Privacy; Chapter 7: Key Management; Bibliography; Back Cover.
|
520 |
|
|
|a The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights,
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Data protection
|x Standards.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Normes.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Normes.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|x Standards
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version
|z 9781466592148
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781466592155/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1538312
|
994 |
|
|
|a 92
|b IZTAP
|