Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.
Les mer
This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.
Les mer
Introduction. Cryptography Basics. Cryptographic Keys. Authentication Protocols. Security Protocols. Architectures. Risk Management. Security Assessments. Illustrations.
Produktdetaljer
ISBN
9780815396413
Publisert
2018-07-17
Utgiver
Vendor
CRC Press Inc
Vekt
290 gr
Høyde
234 mm
Bredde
156 mm
Aldersnivå
P, 06
Språk
Product language
Engelsk
Format
Product format
Innbundet
Antall sider
193
Forfatter