Security without obscurity: a guide to cryptographic architectures

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typic...

Full description

Saved in:
Bibliographic Details
Main Author: Stapleton, Jeffrey James (Author)
Format: Book
Language:English
Published: Boca Raton, London, New York CRC Press 2019
Series:Inforamtion technology
Subjects:
Summary:Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use...
Physical Description:xii, 193 Seiten Diagramme
ISBN:9780815396413

There is no print copy available.

Interlibrary loan Place Request Caution: Not in THWS collection!