000 01829nam a2200229 a 4500
001 51213
003 0000000000
005 20240411193259.0
008 230310n s 000 0 eng d
020 _a9780429884887
100 1 _aStapleton, Jeffrey James.
245 1 0 _aSecurity without obscurity
_h[electronic resource] :
_ba guide to cryptographic architectures /
_cJeffrey James Stapleton.
260 _aBoca Raton, FL :
_bCRC Press, Taylor and Francis Group,
_c2019.
300 _a1 online resource.
505 0 _aIntroduction. Cryptography Basics. Cryptographic Keys. Authentication Protocols. Security Protocols. Architectures. Risk Management. Security Assessments. Illustrations.
520 _aInformation security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use-- Provided by the publisher.
650 7 _aComputer network architectures.
_2sears
650 7 _aData encryption (Computer science)
_2sears
650 7 _aTelecommunication
_xSecurity measures.
_2sears
856 _uhttps://drive.google.com/file/d/1i4lZkP9uJyfE-yGhb2302ZwG4yheAck8/view?usp=sharing
999 _c16436
_d16436