Security without obscurity a guide to confidentiality, authentication, and integrity
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly...
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Boca Raton
Auerbach
2014
|
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Table of Contents:
- Includes bibliographical references and index
- Front Cover; Contents; About the Author; Chapter 1: Introduction; Chapter 2: Confidentiality; Chapter 3: Authentication; Chapter 4: Integrity; Chapter 5: Nonrepudiation; Chapter 6: Privacy; Chapter 7: Key Management; Bibliography; Back Cover