MARC details
000 -LEADER |
fixed length control field |
01829nam a2200229 a 4500 |
001 - CONTROL NUMBER |
control field |
51213 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
0000000000 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240411193259.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230310n s 000 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780429884887 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stapleton, Jeffrey James. |
245 10 - TITLE STATEMENT |
Title |
Security without obscurity |
Medium |
[electronic resource] : |
Remainder of title |
a guide to cryptographic architectures / |
Statement of responsibility, etc. |
Jeffrey James Stapleton. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boca Raton, FL : |
Name of publisher, distributor, etc. |
CRC Press, Taylor and Francis Group, |
Date of publication, distribution, etc. |
2019. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction. Cryptography Basics. Cryptographic Keys. Authentication Protocols. Security Protocols. Architectures. Risk Management. Security Assessments. Illustrations. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use-- Provided by the publisher. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer network architectures. |
Source of heading or term |
sears |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data encryption (Computer science) |
Source of heading or term |
sears |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Telecommunication |
General subdivision |
Security measures. |
Source of heading or term |
sears |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://drive.google.com/file/d/1i4lZkP9uJyfE-yGhb2302ZwG4yheAck8/view?usp=sharing">https://drive.google.com/file/d/1i4lZkP9uJyfE-yGhb2302ZwG4yheAck8/view?usp=sharing</a> |