Security without obscurity : a guide to confidentiality, authentication, and integrity /
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Boca Raton :
Auerbach,
2014.
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |