Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics

Security without obscurity : a guide to confidentiality, authentication, and integrity / J.J. Stapleton

By: Material type: Computer fileComputer fileLanguage: English Publication details: Boca Raton, FL : CRC Press, [2015];©2015Description: 1 online resourceISBN:
  • 9781466592155
Subject(s): DDC classification:
  • 005.800
Online resources:
Contents:
chapter 1. Introduction -- chapter 2. Confidentiality -- chapter 3. Authentication -- chapter 4. Integrity -- chapter 5. Nonrepudiaiation -- chapter 6. Privacy -- chapter 7. Key management
Summary: The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability, also known as the CIA of information security. As the field has become more complex, both novices and professionals with years of experience need a good reference book outlining the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, the book starts with the fundamentals to bridge the understanding gaps--approaching information security from the bedrock principles of CIA
List(s) this item appears in: Computer Science
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

chapter 1. Introduction -- chapter 2. Confidentiality -- chapter 3. Authentication -- chapter 4. Integrity -- chapter 5. Nonrepudiaiation -- chapter 6. Privacy -- chapter 7. Key management

The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability, also known as the CIA of information security. As the field has become more complex, both novices and professionals with years of experience need a good reference book outlining the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, the book starts with the fundamentals to bridge the understanding gaps--approaching information security from the bedrock principles of CIA

There are no comments on this title.

to post a comment.
Share
This system is made operational by the in-house staff of the CUP Library.