36,95 €
36,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
18 °P sammeln
36,95 €
36,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
18 °P sammeln
Als Download kaufen
36,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
18 °P sammeln
Jetzt verschenken
36,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
18 °P sammeln
  • Format: PDF

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a…mehr

Produktbeschreibung
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Jeff Stapleton has 30 plus years' experience in the financial services industry with 25 years as a security professional involved in developing ANSI and ISO security standards including payments, cryptography, key management, public key infrastructures (PKI) and biometrics. Jeff earned his bachelor and master degrees in computer science from the Universities of Missouri in St. Louis (UMSL) and Rolla (UMR) and has taught information security at Washington University in St. Louis (WUSTL) and the University of Teas in San Antonio (UTSA). He has conducted security assessments of payment networks, financial institutions, and assisted in developing secure payment systems. He has authored numerous ISSA Journal articles, IEEE papers, and other periodicals. His book series Security without Obscurity is available from CRC Press.