Security without obscurity a guide to confidentiality, authentication, and integrity

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...

Full description

Bibliographic Details
Main Author: Stapleton, Jeffrey James
Format: eBook
Language:English
Published: Boca Raton Auerbach 2014
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Includes bibliographical references and index
  • Front Cover; Contents; About the Author; Chapter 1: Introduction; Chapter 2: Confidentiality; Chapter 3: Authentication; Chapter 4: Integrity; Chapter 5: Nonrepudiation; Chapter 6: Privacy; Chapter 7: Key Management; Bibliography; Back Cover