Security without obscurity : a guide to confidentiality, authentication, and integrity /

Stapleton, Jeffrey James

Security without obscurity : a guide to confidentiality, authentication, and integrity / J.J. Stapleton - Boca Raton, FL : CRC Press, [2015];©2015 - 1 online resource

chapter 1. Introduction -- chapter 2. Confidentiality -- chapter 3. Authentication -- chapter 4. Integrity -- chapter 5. Nonrepudiaiation -- chapter 6. Privacy -- chapter 7. Key management

The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability, also known as the CIA of information security. As the field has become more complex, both novices and professionals with years of experience need a good reference book outlining the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, the book starts with the fundamentals to bridge the understanding gaps--approaching information security from the bedrock principles of CIA

9781466592155


Computer security
Computer networks
Information technology
Data Protection

005.800
This system is made operational by the in-house staff of the CUP Library.