5be1588b3df33.png
PDF
Security Without Obscurity

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validatin...

56a1fd4881b32.jpg
PDF
Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity

Jeff's extensive practical experience in applying information security and his expertise in cryptographic standards makes this book a must-read for the information security professional. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity deserves a place in your reference library. Stapleton shows how broad his security knowledge is to the world. When it comes to the world of encryption and cryptogra...