Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics

Security without obscurity : a guide to cryptographic architectures / by Jeff Stapleton

By: Material type: Computer fileComputer fileLanguage: English Publication details: Boca Raton, FL : CRC Press, [2015];©2015Edition: First editionDescription: 1 online resource (205 pages)ISBN:
  • 9780429884894
Subject(s): DDC classification:
  • 005.800
Online resources:
Contents:
chapter 1 Introduction -- chapter 2 Cryptography Basics -- chapter 3 Cryptographic Keys -- chapter 4 Authentication Protocols -- chapter 5 Encryption Protocols -- chapter 6 Architectures -- chapter 7 Risk Management -- chapter 8 Security Assessments -- chapter 9 Illustrations
Summary: Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use
List(s) this item appears in: Computer Science
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number URL Status Barcode
E-Book E-Book Ranganathan Library 005.800 (Browse shelf(Opens below)) Link to resource Available E01475

chapter 1 Introduction -- chapter 2 Cryptography Basics -- chapter 3 Cryptographic Keys -- chapter 4 Authentication Protocols -- chapter 5 Encryption Protocols -- chapter 6 Architectures -- chapter 7 Risk Management -- chapter 8 Security Assessments -- chapter 9 Illustrations

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use

There are no comments on this title.

to post a comment.
Share
This system is made operational by the in-house staff of the CUP Library.