Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Security without obscurity : a guide to cryptographic architectures
by
Stapleton, Jeffrey James, author
in
Telecommunication Security measures.
/ Data encryption (Computer science)
/ Computer network architectures.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Security without obscurity : a guide to cryptographic architectures
by
Stapleton, Jeffrey James, author
in
Telecommunication Security measures.
/ Data encryption (Computer science)
/ Computer network architectures.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Security without obscurity : a guide to cryptographic architectures
Book
Security without obscurity : a guide to cryptographic architectures
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use-- Provided by the publisher.
Publisher
CRC Press, Taylor & Francis Group
Subject
ISBN
9780815396413
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| TK5102.94.S73 2019 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.