Book description
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurit
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents
- About the Author (1/2)
- About the Author (2/2)
- Chapter 1: Introduction (1/12)
- Chapter 1: Introduction (2/12)
- Chapter 1: Introduction (3/12)
- Chapter 1: Introduction (4/12)
- Chapter 1: Introduction (5/12)
- Chapter 1: Introduction (6/12)
- Chapter 1: Introduction (7/12)
- Chapter 1: Introduction (8/12)
- Chapter 1: Introduction (9/12)
- Chapter 1: Introduction (10/12)
- Chapter 1: Introduction (11/12)
- Chapter 1: Introduction (12/12)
- Chapter 2: Confidentiality (1/7)
- Chapter 2: Confidentiality (2/7)
- Chapter 2: Confidentiality (3/7)
- Chapter 2: Confidentiality (4/7)
- Chapter 2: Confidentiality (5/7)
- Chapter 2: Confidentiality (6/7)
- Chapter 2: Confidentiality (7/7)
- Chapter 3: Authentication (1/16)
- Chapter 3: Authentication (2/16)
- Chapter 3: Authentication (3/16)
- Chapter 3: Authentication (4/16)
- Chapter 3: Authentication (5/16)
- Chapter 3: Authentication (6/16)
- Chapter 3: Authentication (7/16)
- Chapter 3: Authentication (8/16)
- Chapter 3: Authentication (9/16)
- Chapter 3: Authentication (10/16)
- Chapter 3: Authentication (11/16)
- Chapter 3: Authentication (12/16)
- Chapter 3: Authentication (13/16)
- Chapter 3: Authentication (14/16)
- Chapter 3: Authentication (15/16)
- Chapter 3: Authentication (16/16)
- Chapter 4: Integrity (1/6)
- Chapter 4: Integrity (2/6)
- Chapter 4: Integrity (3/6)
- Chapter 4: Integrity (4/6)
- Chapter 4: Integrity (5/6)
- Chapter 4: Integrity (6/6)
- Chapter 5: Nonrepudiation (1/3)
- Chapter 5: Nonrepudiation (2/3)
- Chapter 5: Nonrepudiation (3/3)
- Chapter 6: Privacy (1/6)
- Chapter 6: Privacy (2/6)
- Chapter 6: Privacy (3/6)
- Chapter 6: Privacy (4/6)
- Chapter 6: Privacy (5/6)
- Chapter 6: Privacy (6/6)
- Chapter 7: Key Management (1/16)
- Chapter 7: Key Management (2/16)
- Chapter 7: Key Management (3/16)
- Chapter 7: Key Management (4/16)
- Chapter 7: Key Management (5/16)
- Chapter 7: Key Management (6/16)
- Chapter 7: Key Management (7/16)
- Chapter 7: Key Management (8/16)
- Chapter 7: Key Management (9/16)
- Chapter 7: Key Management (10/16)
- Chapter 7: Key Management (11/16)
- Chapter 7: Key Management (12/16)
- Chapter 7: Key Management (13/16)
- Chapter 7: Key Management (14/16)
- Chapter 7: Key Management (15/16)
- Chapter 7: Key Management (16/16)
- Bibliography (1/4)
- Bibliography (2/4)
- Bibliography (3/4)
- Bibliography (4/4)
- Back Cover
Product information
- Title: Security without Obscurity
- Author(s):
- Release date: May 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781466592155
You might also like
book
Security without Obscurity
This book provides a no-nonsense approach for operating a public key infrastructure (PKI) system. In addition …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Take Control of Your Passwords, 4th Edition
Overcome password frustration with Joe Kissell's expert advice! Version 4.1.1, updated March 21, 2024 Password overload …
book
Bring Your Own Devices (BYOD) Survival Guide
Where end-users once queued up to ask the IT department for permission to buy a new …