Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.
Mua cuốn sách điện tử này và nhận thêm 1 cuốn MIỄN PHÍ!
định dạng PDF ● Trang 205 ● ISBN 9780429884894 ● Nhà xuất bản CRC Press ● Được phát hành 2018 ● Có thể tải xuống 3 lần ● Tiền tệ EUR ● TÔI 7106422 ● Sao chép bảo vệ Adobe DRM
Yêu cầu trình đọc ebook có khả năng DRM