Cargando…
Security without obscurity: a guide to confidentiality, authentication, and integrity
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Taylor and Francis
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1706422 |
_version_ | 1780936501688795136 |
---|---|
author | Stapleton, JJ |
author_facet | Stapleton, JJ |
author_sort | Stapleton, JJ |
collection | CERN |
description | The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor |
id | cern-1706422 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2014 |
publisher | Taylor and Francis |
record_format | invenio |
spelling | cern-17064222021-04-21T20:59:21Zhttp://cds.cern.ch/record/1706422engStapleton, JJSecurity without obscurity: a guide to confidentiality, authentication, and integrityComputing and ComputersThe traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about inforTaylor and Francisoai:cds.cern.ch:17064222014 |
spellingShingle | Computing and Computers Stapleton, JJ Security without obscurity: a guide to confidentiality, authentication, and integrity |
title | Security without obscurity: a guide to confidentiality, authentication, and integrity |
title_full | Security without obscurity: a guide to confidentiality, authentication, and integrity |
title_fullStr | Security without obscurity: a guide to confidentiality, authentication, and integrity |
title_full_unstemmed | Security without obscurity: a guide to confidentiality, authentication, and integrity |
title_short | Security without obscurity: a guide to confidentiality, authentication, and integrity |
title_sort | security without obscurity: a guide to confidentiality, authentication, and integrity |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1706422 |
work_keys_str_mv | AT stapletonjj securitywithoutobscurityaguidetoconfidentialityauthenticationandintegrity |