Cargando…

Security without obscurity: a guide to confidentiality, authentication, and integrity

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...

Descripción completa

Detalles Bibliográficos
Autor principal: Stapleton, JJ
Lenguaje:eng
Publicado: Taylor and Francis 2014
Materias:
Acceso en línea:http://cds.cern.ch/record/1706422
_version_ 1780936501688795136
author Stapleton, JJ
author_facet Stapleton, JJ
author_sort Stapleton, JJ
collection CERN
description The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about infor
id cern-1706422
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2014
publisher Taylor and Francis
record_format invenio
spelling cern-17064222021-04-21T20:59:21Zhttp://cds.cern.ch/record/1706422engStapleton, JJSecurity without obscurity: a guide to confidentiality, authentication, and integrityComputing and ComputersThe traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about inforTaylor and Francisoai:cds.cern.ch:17064222014
spellingShingle Computing and Computers
Stapleton, JJ
Security without obscurity: a guide to confidentiality, authentication, and integrity
title Security without obscurity: a guide to confidentiality, authentication, and integrity
title_full Security without obscurity: a guide to confidentiality, authentication, and integrity
title_fullStr Security without obscurity: a guide to confidentiality, authentication, and integrity
title_full_unstemmed Security without obscurity: a guide to confidentiality, authentication, and integrity
title_short Security without obscurity: a guide to confidentiality, authentication, and integrity
title_sort security without obscurity: a guide to confidentiality, authentication, and integrity
topic Computing and Computers
url http://cds.cern.ch/record/1706422
work_keys_str_mv AT stapletonjj securitywithoutobscurityaguidetoconfidentialityauthenticationandintegrity