Cargando…
Security without obscurity: a guide to confidentiality, authentication, and integrity
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...
Autor principal: | Stapleton, JJ |
---|---|
Lenguaje: | eng |
Publicado: |
Taylor and Francis
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1706422 |
Ejemplares similares
-
Security without obscurity: a guide to cryptographic architectures
por: Stapleton, Jeff
Publicado: (2018) -
Security without obscurity: a guide to PKI operations
por: Stapleton, Jeffrey James
Publicado: (2015) -
Passwords: philology, security, authentication
por: Lennon, Brian
Publicado: (2018) -
Safeguarding critical e-documents: implementing a program for securing confidential information assets
por: Smallwood, Robert F, et al.
Publicado: (2012) -
Security and authentication: cybercrime and cybersecurity research
por: Song, Ong Thian, et al.
Publicado: (2017)