Security without Obscurity

Book description

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurit

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents
  4. About the Author (1/2)
  5. About the Author (2/2)
  6. Chapter 1: Introduction (1/12)
  7. Chapter 1: Introduction (2/12)
  8. Chapter 1: Introduction (3/12)
  9. Chapter 1: Introduction (4/12)
  10. Chapter 1: Introduction (5/12)
  11. Chapter 1: Introduction (6/12)
  12. Chapter 1: Introduction (7/12)
  13. Chapter 1: Introduction (8/12)
  14. Chapter 1: Introduction (9/12)
  15. Chapter 1: Introduction (10/12)
  16. Chapter 1: Introduction (11/12)
  17. Chapter 1: Introduction (12/12)
  18. Chapter 2: Confidentiality (1/7)
  19. Chapter 2: Confidentiality (2/7)
  20. Chapter 2: Confidentiality (3/7)
  21. Chapter 2: Confidentiality (4/7)
  22. Chapter 2: Confidentiality (5/7)
  23. Chapter 2: Confidentiality (6/7)
  24. Chapter 2: Confidentiality (7/7)
  25. Chapter 3: Authentication (1/16)
  26. Chapter 3: Authentication (2/16)
  27. Chapter 3: Authentication (3/16)
  28. Chapter 3: Authentication (4/16)
  29. Chapter 3: Authentication (5/16)
  30. Chapter 3: Authentication (6/16)
  31. Chapter 3: Authentication (7/16)
  32. Chapter 3: Authentication (8/16)
  33. Chapter 3: Authentication (9/16)
  34. Chapter 3: Authentication (10/16)
  35. Chapter 3: Authentication (11/16)
  36. Chapter 3: Authentication (12/16)
  37. Chapter 3: Authentication (13/16)
  38. Chapter 3: Authentication (14/16)
  39. Chapter 3: Authentication (15/16)
  40. Chapter 3: Authentication (16/16)
  41. Chapter 4: Integrity (1/6)
  42. Chapter 4: Integrity (2/6)
  43. Chapter 4: Integrity (3/6)
  44. Chapter 4: Integrity (4/6)
  45. Chapter 4: Integrity (5/6)
  46. Chapter 4: Integrity (6/6)
  47. Chapter 5: Nonrepudiation (1/3)
  48. Chapter 5: Nonrepudiation (2/3)
  49. Chapter 5: Nonrepudiation (3/3)
  50. Chapter 6: Privacy (1/6)
  51. Chapter 6: Privacy (2/6)
  52. Chapter 6: Privacy (3/6)
  53. Chapter 6: Privacy (4/6)
  54. Chapter 6: Privacy (5/6)
  55. Chapter 6: Privacy (6/6)
  56. Chapter 7: Key Management (1/16)
  57. Chapter 7: Key Management (2/16)
  58. Chapter 7: Key Management (3/16)
  59. Chapter 7: Key Management (4/16)
  60. Chapter 7: Key Management (5/16)
  61. Chapter 7: Key Management (6/16)
  62. Chapter 7: Key Management (7/16)
  63. Chapter 7: Key Management (8/16)
  64. Chapter 7: Key Management (9/16)
  65. Chapter 7: Key Management (10/16)
  66. Chapter 7: Key Management (11/16)
  67. Chapter 7: Key Management (12/16)
  68. Chapter 7: Key Management (13/16)
  69. Chapter 7: Key Management (14/16)
  70. Chapter 7: Key Management (15/16)
  71. Chapter 7: Key Management (16/16)
  72. Bibliography (1/4)
  73. Bibliography (2/4)
  74. Bibliography (3/4)
  75. Bibliography (4/4)
  76. Back Cover

Product information

  • Title: Security without Obscurity
  • Author(s): J.J. Stapleton
  • Release date: May 2014
  • Publisher(s): Auerbach Publications
  • ISBN: 9781466592155