0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,235 Discovery Miles 12 350 Ships in 9 - 17 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Security without Obscurity - A Guide to Cryptographic Architectures (Hardcover): Jeff Stapleton Security without Obscurity - A Guide to Cryptographic Architectures (Hardcover)
Jeff Stapleton
R2,164 Discovery Miles 21 640 Ships in 12 - 19 working days

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

Security without Obscurity - Frequently Asked Questions (FAQ) (Hardcover): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Hardcover)
Jeff Stapleton
R2,733 Discovery Miles 27 330 Ships in 12 - 19 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Security without Obscurity - A Guide to Cryptographic Architectures (Paperback): Jeff Stapleton Security without Obscurity - A Guide to Cryptographic Architectures (Paperback)
Jeff Stapleton
R1,455 Discovery Miles 14 550 Ships in 12 - 19 working days

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
James Garfield and the Civil War - For…
Daniel J Vermilya Paperback R669 R612 Discovery Miles 6 120
International Finance and The Developing…
G. Bird Hardcover R2,895 Discovery Miles 28 950
Daniel Negreanu's Power Hold'em Strategy
Daniel Negreanu Paperback R929 R818 Discovery Miles 8 180
Tunjur! Tunjur! Tunjur! - A Palestinian…
Margaret Read Macdonald Paperback R251 R235 Discovery Miles 2 350
Cancer and Vitamin C
Qi Chen, Margreet C. M. Vissers Paperback R1,549 Discovery Miles 15 490
The Idle Word - Short Religious Essays…
Edward Meyrick Goulburn Paperback R486 Discovery Miles 4 860
The Gleaner: November, 1942 (Classic…
National Farm School Hardcover R628 R542 Discovery Miles 5 420
An Authentic Narrative of Some…
John Newton Paperback R487 Discovery Miles 4 870
An Inquiry Into the Structure and Animal…
Richard Lawrence Paperback R563 Discovery Miles 5 630
We Belong - 50 Strategies to Create…
Laurie Barron, Patti Kinney Paperback R836 R725 Discovery Miles 7 250

 

Partners