000 | 01829nam a2200229 a 4500 | ||
---|---|---|---|
001 | 51213 | ||
003 | 0000000000 | ||
005 | 20240411193259.0 | ||
008 | 230310n s 000 0 eng d | ||
020 | _a9780429884887 | ||
100 | 1 | _aStapleton, Jeffrey James. | |
245 | 1 | 0 |
_aSecurity without obscurity _h[electronic resource] : _ba guide to cryptographic architectures / _cJeffrey James Stapleton. |
260 |
_aBoca Raton, FL : _bCRC Press, Taylor and Francis Group, _c2019. |
||
300 | _a1 online resource. | ||
505 | 0 | _aIntroduction. Cryptography Basics. Cryptographic Keys. Authentication Protocols. Security Protocols. Architectures. Risk Management. Security Assessments. Illustrations. | |
520 | _aInformation security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use-- Provided by the publisher. | ||
650 | 7 |
_aComputer network architectures. _2sears |
|
650 | 7 |
_aData encryption (Computer science) _2sears |
|
650 | 7 |
_aTelecommunication _xSecurity measures. _2sears |
|
856 | _uhttps://drive.google.com/file/d/1i4lZkP9uJyfE-yGhb2302ZwG4yheAck8/view?usp=sharing | ||
999 |
_c16436 _d16436 |