Security without Obscurity: Frequently Asked Questions (FAQ)
Autor Jeff Stapletonen Limba Engleză Paperback – 30 mai 2022
The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity.
This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (2) | 247.39 lei 3-5 săpt. | +19.69 lei 7-13 zile |
CRC Press – 30 mai 2022 | 247.39 lei 3-5 săpt. | +19.69 lei 7-13 zile |
CRC Press – 30 sep 2020 | 247.49 lei 6-8 săpt. | |
Hardback (2) | 471.95 lei 6-8 săpt. | |
CRC Press – 20 apr 2021 | 471.95 lei 6-8 săpt. | |
CRC Press – 17 iul 2018 | 489.93 lei 6-8 săpt. |
Preț: 247.39 lei
Preț vechi: 309.24 lei
-20% Nou
Puncte Express: 371
Preț estimativ în valută:
47.37€ • 49.32$ • 39.30£
47.37€ • 49.32$ • 39.30£
Carte disponibilă
Livrare economică 23 ianuarie-06 februarie
Livrare express 09-15 ianuarie pentru 29.68 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367708139
ISBN-10: 0367708132
Pagini: 252
Ilustrații: 44 Tables, black and white; 100 Illustrations, black and white
Dimensiuni: 156 x 234 x 22 mm
Greutate: 0.47 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
ISBN-10: 0367708132
Pagini: 252
Ilustrații: 44 Tables, black and white; 100 Illustrations, black and white
Dimensiuni: 156 x 234 x 22 mm
Greutate: 0.47 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Public țintă
Adult education, Professional, and Undergraduate CoreCuprins
Chapter 1: Book Overview
Chapter 2: Security Basics
Chapter 3: Cryptography
Chapter 4: Key Management
Chapter 5: Public Key Infrastructure (PKI)
Chapter 6: Authentication
Chapter 7: Authorization
Chapter 8: Security Protocols
Chapter 9: Privacy
Chapter 10: Quick Reference Guides
References and Standards
Chapter 2: Security Basics
Chapter 3: Cryptography
Chapter 4: Key Management
Chapter 5: Public Key Infrastructure (PKI)
Chapter 6: Authentication
Chapter 7: Authorization
Chapter 8: Security Protocols
Chapter 9: Privacy
Chapter 10: Quick Reference Guides
References and Standards
Notă biografică
Jeff Stapleton has 30 plus years’ experience in the financial services industry with 25 years as a security professional involved in developing ANSI and ISO security standards including payments, cryptography, key management, public key infrastructures (PKI) and biometrics. He has also been the X9F4 Cybersecurity and Cryptographic Solutions workgroup chair for over 20 years.Jeff earned his bachelor’s and master’s degrees in Computer Science from the Universities of Missouri in St. Louis (UMSL) and Rolla (UMR) and has taught Information Security at Washington University in St. Louis (WUSTL) and the University of Texas in San Antonio (UTSA). He has conducted security assessments of payment networks, financial institutions, and assisted in developing secure payment systems. He has authored dozens of ISSA Journal articles, IEEE papers, and chapters in various books, including his own 3 book series Security without Obscurity, which is available from CRC Press.
Descriere
Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security Without Obscurity books, to provide clear information and answers to the most commonly asked questions about information security solutions that use or rely on cryptography and key management methods.