Security without Obscurity e-bog
403,64 DKK
(inkl. moms 504,55 DKK)
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to...
E-bog
403,64 DKK
Forlag
Auerbach Publications
Udgivet
11 juli 2018
Længde
193 sider
Genrer
GPJ
Sprog
English
Format
epub
Beskyttelse
LCP
ISBN
9780429884887
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.