Bataan Peninsula State University
Amazon cover image
Image from Amazon.com
Image from Google Jackets

Security without obscurity [electronic resource] : a guide to cryptographic architectures / Jeffrey James Stapleton.

By: Material type: TextTextPublication details: Boca Raton, FL : CRC Press, Taylor and Francis Group, 2019.Description: 1 online resourceISBN:
  • 9780429884887
Subject(s): Online resources:
Contents:
Introduction. Cryptography Basics. Cryptographic Keys. Authentication Protocols. Security Protocols. Architectures. Risk Management. Security Assessments. Illustrations.
Summary: Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use-- Provided by the publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
E-Resources Main Library E-Resources 005.8/24 St794 (Browse shelf(Opens below)) Available E005310

Introduction. Cryptography Basics. Cryptographic Keys. Authentication Protocols. Security Protocols. Architectures. Risk Management. Security Assessments. Illustrations.

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use-- Provided by the publisher.

There are no comments on this title.

to post a comment.
Bataan Peninsula State University

  All rights Reserved
  Bataan Peninsula State University
  © 2024

Branches :

Abucay Campus: Bangkal, Abucay, Bataan, 2114
Bagac Campus: Bagumbayan, Bagac, Bataan 2107
Balanga Campus: Don Manuel Banzon Ave., Poblacion, City of Balanga, Bataan 2100
Dinalupihan Campus: San Ramon, Dinalupihan, Bataan, 2110
Orani Campus: Bayan, Orani, Bataan, 2112
Main Campus: Capitol Compound, Tenejero, City of Balanga, Bataan 2100

Powered by Koha