Security without obscurity : a guide to cryptographic architectures

書誌事項

Security without obscurity : a guide to cryptographic architectures

J.J. Stapleton

(An Auerbach book)

CRC Press, 2019

  • : hardback

大学図書館所蔵 件 / 1

この図書・雑誌をさがす

注記

Bibliography: p. 183-187

Includes index

Summary: Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use-- Provided by the publisher

内容説明・目次

内容説明

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

目次

Introduction. Cryptography Basics. Cryptographic Keys. Authentication Protocols. Security Protocols. Architectures. Risk Management. Security Assessments. Illustrations.

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

ページトップへ