Cargando…
Security without obscurity: a guide to confidentiality, authentication, and integrity
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Taylor and Francis
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1706422 |
Sumario: | The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor |
---|