The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author s knowledge, insights, and observations about information security based on his.
Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity ipod
Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity reviews
J.J. Stapleton ebooks downloads
Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity read online
Tuesday, January 29, 2019
Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity pdf by J.J. Stapleton Download
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.