Security without obscurity : a guide to cryptographic architectures /

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typic...

ver descrição completa

Detalhes bibliográficos
Autor principal: Stapleton, Jeffrey James (Autor)
Formato: Livro
Idioma:English
Publicado em: Boca Raton, FL : CRC Press, Taylor & Francis Group, c2019.
Assuntos:
Classic Catalogue: View this record in Classic Catalogue
LEADER 02239nam a2200373 i 4500
001 34329
003 BD-DhAAL
005 20211110165111.0
008 190321t2019 flua b 001 0 eng
999 |c 40456  |d 40456 
010 |a  2018013759 
020 |a 9780815396413 (hbk. : acidfree paper) 
020 |z 9780429467523 (ebook) 
040 |a DLC  |b eng  |c DLC  |e rda  |d DLC  |d BD-DhAAL 
042 |a pcc 
050 0 0 |a TK5102.94  |b .S73 2019 
082 0 0 |a 005.824  |2 23 
100 1 |a Stapleton, Jeffrey James,  |e author.  |9 30353 
245 1 0 |a Security without obscurity :  |b a guide to cryptographic architectures /  |c J.J. Stapleton. 
246 |a Security without obscurity 
260 |a Boca Raton, FL :  |b CRC Press, Taylor & Francis Group,  |c c2019. 
300 |a xii, 193 pages :  |b illustrations ;  |c 24 cm. 
500 |a "A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa plc." 
504 |a Includes bibiliographical references (pages 183-187) and index. 
520 |a Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use-- 
526 |a CSE 
541 |a Parama  |e 34329 
650 0 |a Telecommunication  |x Security measures.  |9 30354 
650 0 |a Data encryption (Computer science).  |9 30355 
650 0 |a Computer network architectures.  |9 30356 
650 0 |a Computer science.  |9 42497 
852 |a Ayesha Abed Library  |c General Stacks 
942 |2 ddc  |c BK 
952 |0 0  |1 0  |2 ddc  |4 0  |6 005_824000000000000_STA  |7 0  |9 65088  |a BRACUL  |b BRACUL  |c GEN  |d 2019-02-26  |e Parama  |g 4401.29  |l 2  |m 44  |o 005.824 STA  |p 3010034329  |r 2024-09-02  |s 2024-05-12  |t 1  |v 4401.29  |w 2019-02-26  |y BK