. . "Informationssystem." . . "Datensicherung." . . "Protection de l'information (Informatique) Normes." . . "Datenverarbeitung." . . "Computer networks Security measures." . . "Computer networks Security measures" . "Sécurité informatique." . . "COMPUTERS Internet Security." . . "Data protection Standards." . . "Data protection Standards" . "COMPUTERS / Security / General." . . "COMPUTERS / Security / General" . "COMPUTERS Security General." . "Réseaux d'ordinateurs Sécurité Mesures." . . "Technologie de l'information Sécurité Mesures." . . "BUSINESS & ECONOMICS / Management." . . "BUSINESS & ECONOMICS / Management" . "Computer security." . . "Computer security" . "COMPUTERS Networking Security." . . "Authentifikation." . . . . . . . "The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights,"@en . . "Security without Obscurity : A Guide to Confidentiality"@en . . . . . . . . . . "Security without Obscurity"@en . . . . "Introduction About This Book Audience for This Book Guide to This Book Standards Standards Organizations ISO TC68 Financial Services ASC X9 Financial Services Standards Depreciation Risk Assessment Threat Analysis Vulnerability Analysis Probability Analysis Impact Analysis Control Adjustments Example AssessmentConfidentiality Data Classification Data Groups Data Tagging Data States Data in Transit Encryption Methods Encryption Methods 2 Encryption Methods 3 Data in Process Data in ..." . . "\"The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability, also known as the CIA of information security. As the field has become more complex, both novices and professionals with years of experience need a good reference book outlining the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, the book starts with the fundamentals to bridge the understanding gaps--approaching information security from the bedrock principles of CIA\"--"@en . "\"The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability, also known as the CIA of information security. As the field has become more complex, both novices and professionals with years of experience need a good reference book outlining the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, the book starts with the fundamentals to bridge the understanding gaps--approaching information security from the bedrock principles of CIA\"--" . . . . . . "Electronic books" . "Electronic books"@en . "\"The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability, also known as the CIA of information security. As the field has become more complex, both novices and professionals with years of experience need a good reference book outlining the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, the book starts with the fundamentals to bridge the understanding gaps--approaching information security from the bedrock principles of CIA. \"--" . "The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability, also known as the CIA of information security. As the field has become more complex, both novices and professionals with years of experience need a good reference book outlining the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, the book starts with the fundamentals to bridge the understanding gaps--approaching information security from the bedrock principles of CIA. \" -- Provided by publisher." . . "Security without obscurity : a guide to confidentiality, authentication, and integrity"@en . "Security without obscurity : a guide to confidentiality, authentication, and integrity" . . . . . . . . . "Security without obscurity a guide to confidentiality, authentication, and integrity" . "Security without obscurity a guide to confidentiality, authentication, and integrity"@en . . . "Livres électroniques" . "Computersicherheit." . . "BUSINESS et ECONOMICS / Management." . . "COMPUTERS / Information Technology." . . "COMPUTERS / Information Technology" . "Information technology Security measures." . . "Information technology Security measures" .