Security without obscurity : a guide to confidentiality, authentication, and integrity /
Stapleton, Jeffrey James
Security without obscurity : a guide to confidentiality, authentication, and integrity / J.J. Stapleton - Boca Raton, FL : CRC Press, [2015];©2015 - 1 online resource
chapter 1. Introduction -- chapter 2. Confidentiality -- chapter 3. Authentication -- chapter 4. Integrity -- chapter 5. Nonrepudiaiation -- chapter 6. Privacy -- chapter 7. Key management
The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability, also known as the CIA of information security. As the field has become more complex, both novices and professionals with years of experience need a good reference book outlining the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, the book starts with the fundamentals to bridge the understanding gaps--approaching information security from the bedrock principles of CIA
9781466592155
Computer security
Computer networks
Information technology
Data Protection
005.800
Security without obscurity : a guide to confidentiality, authentication, and integrity / J.J. Stapleton - Boca Raton, FL : CRC Press, [2015];©2015 - 1 online resource
chapter 1. Introduction -- chapter 2. Confidentiality -- chapter 3. Authentication -- chapter 4. Integrity -- chapter 5. Nonrepudiaiation -- chapter 6. Privacy -- chapter 7. Key management
The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability, also known as the CIA of information security. As the field has become more complex, both novices and professionals with years of experience need a good reference book outlining the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, the book starts with the fundamentals to bridge the understanding gaps--approaching information security from the bedrock principles of CIA
9781466592155
Computer security
Computer networks
Information technology
Data Protection
005.800