Amazon cover image
Image from Amazon.com

Security without obscurity : a guide to cryptographic architectures / J.J. Stapleton.

By: Publication details: Boca Raton, FL : CRC Press, Taylor & Francis Group, c2019.Description: xii, 193 pages : illustrations ; 24 cmISBN:
  • 9780815396413 (hbk. : acidfree paper)
Other title:
  • Security without obscurity
Subject(s): DDC classification:
  • 005.824 23
LOC classification:
  • TK5102.94 .S73 2019
Summary: Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use--
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 4.0 (1 votes)
Holdings
Item type Current library Home library Call number Copy number Status Date due Barcode Item holds
Book Book Ayesha Abed Library General Stacks Ayesha Abed Library General Stacks 005.824 STA (Browse shelf(Opens below)) 1 Checked out 07/07/2024 3010034329
Total holds: 0

"A CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa plc."

Includes bibiliographical references (pages 183-187) and index.

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use--

CSE

There are no comments on this title.

to post a comment.
Share