Security without obscurity: a guide to cryptographic architectures
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typic...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton, London, New York
CRC Press
2019
|
Schriftenreihe: | Inforamtion technology
|
Schlagworte: | |
Zusammenfassung: | Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use... |
Beschreibung: | xii, 193 Seiten Diagramme |
ISBN: | 9780815396413 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046359342 | ||
003 | DE-604 | ||
005 | 20200306 | ||
007 | t | ||
008 | 200129s2019 xxu|||| |||| 00||| eng d | ||
010 | |a 018013759 | ||
020 | |a 9780815396413 |9 978-0-8153-9641-3 | ||
035 | |a (OCoLC)1143809556 | ||
035 | |a (DE-599)BVBBV046359342 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-11 | ||
050 | 0 | |a TK5102.94 | |
082 | 0 | |a 005.8/24 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Stapleton, Jeffrey James |0 (DE-588)1063955122 |4 aut | |
245 | 1 | 0 | |a Security without obscurity |b a guide to cryptographic architectures |c J.J. Stapleton |
264 | 1 | |a Boca Raton, London, New York |b CRC Press |c 2019 | |
264 | 4 | |c © 2019 | |
300 | |a xii, 193 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Inforamtion technology | |
520 | |a Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use... | ||
650 | 4 | |a Telecommunication |x Security measures | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer network architectures | |
999 | |a oai:aleph.bib-bvb.de:BVB01-031735670 |
Datensatz im Suchindex
_version_ | 1804180871789412352 |
---|---|
any_adam_object | |
author | Stapleton, Jeffrey James |
author_GND | (DE-588)1063955122 |
author_facet | Stapleton, Jeffrey James |
author_role | aut |
author_sort | Stapleton, Jeffrey James |
author_variant | j j s jj jjs |
building | Verbundindex |
bvnumber | BV046359342 |
callnumber-first | T - Technology |
callnumber-label | TK5102 |
callnumber-raw | TK5102.94 |
callnumber-search | TK5102.94 |
callnumber-sort | TK 45102.94 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1143809556 (DE-599)BVBBV046359342 |
dewey-full | 005.8/24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/24 |
dewey-search | 005.8/24 |
dewey-sort | 15.8 224 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01837nam a2200385 c 4500</leader><controlfield tag="001">BV046359342</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200306 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200129s2019 xxu|||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">018013759</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780815396413</subfield><subfield code="9">978-0-8153-9641-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1143809556</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046359342</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5102.94</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/24</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stapleton, Jeffrey James</subfield><subfield code="0">(DE-588)1063955122</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security without obscurity</subfield><subfield code="b">a guide to cryptographic architectures</subfield><subfield code="c">J.J. Stapleton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, London, New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 193 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Inforamtion technology</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031735670</subfield></datafield></record></collection> |
id | DE-604.BV046359342 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:42:39Z |
institution | BVB |
isbn | 9780815396413 |
language | English |
lccn | 018013759 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031735670 |
oclc_num | 1143809556 |
open_access_boolean | |
owner | DE-11 |
owner_facet | DE-11 |
physical | xii, 193 Seiten Diagramme |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | CRC Press |
record_format | marc |
series2 | Inforamtion technology |
spelling | Stapleton, Jeffrey James (DE-588)1063955122 aut Security without obscurity a guide to cryptographic architectures J.J. Stapleton Boca Raton, London, New York CRC Press 2019 © 2019 xii, 193 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Inforamtion technology Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use... Telecommunication Security measures Data encryption (Computer science) Computer network architectures |
spellingShingle | Stapleton, Jeffrey James Security without obscurity a guide to cryptographic architectures Telecommunication Security measures Data encryption (Computer science) Computer network architectures |
title | Security without obscurity a guide to cryptographic architectures |
title_auth | Security without obscurity a guide to cryptographic architectures |
title_exact_search | Security without obscurity a guide to cryptographic architectures |
title_full | Security without obscurity a guide to cryptographic architectures J.J. Stapleton |
title_fullStr | Security without obscurity a guide to cryptographic architectures J.J. Stapleton |
title_full_unstemmed | Security without obscurity a guide to cryptographic architectures J.J. Stapleton |
title_short | Security without obscurity |
title_sort | security without obscurity a guide to cryptographic architectures |
title_sub | a guide to cryptographic architectures |
topic | Telecommunication Security measures Data encryption (Computer science) Computer network architectures |
topic_facet | Telecommunication Security measures Data encryption (Computer science) Computer network architectures |
work_keys_str_mv | AT stapletonjeffreyjames securitywithoutobscurityaguidetocryptographicarchitectures |