¥9,855
この書籍はよりお買い得なバージョンをご購入いただけます
Kindle版を選ぶと、¥ 3,653 (34%) お買い得にご購入いただけます。
¥ 6,202
Kindle版
¥ 9,855
ハードカバー価格

Kindle版を選ぶと、<span class="a-color-price">¥ 3,653 (34%)</span> お買い得にご購入いただけます。 iOS, Android, Mac & パソコンで使えるKindle無料アプリで今すぐ読む
通常配送無料 詳細
残り2点(入荷予定あり) 在庫状況について
この商品は、Amazon.co.jp が販売、発送します。
Security without Obscurit... がカートに入りました
この商品をお持ちですか? マーケットプレイスに出品する
裏表紙を表示 表紙を表示
サンプルを聴く 再生中... 一時停止   Audible オーディオエディションのサンプルをお聴きいただいています。
3点すべてのイメージを見る

Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity ハードカバー – 2014/5/12


その他(3)の形式およびエディションを表示する 他のフォーマットおよびエディションを非表示にする
価格
新品 中古品
Kindle版
ハードカバー
¥ 9,855
¥ 9,215 ¥ 9,000

ブックマイレージカード
click to open popover

キャンペーンおよび追加情報

Kindle 端末は必要ありません。無料 Kindle アプリのいずれかをダウンロードすると、スマートフォン、タブレットPCで Kindle 本をお読みいただけます。

  • iOSアプリのダウンロードはこちらをクリック
    Apple
  • Androidアプリのダウンロードはこちらをクリック
    Android
  • Amazonアプリストアへはこちらをクリック
    Android

無料アプリを入手するには、Eメールアドレスを入力してください。

kcpAppSendButton

商品の説明

内容紹介

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need.

Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author’s knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards. Starting with the fundamentals, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication.

The text delves beyond the typical cryptographic abstracts of encryption and digital signatures as the fundamental security controls to explain how to implement them into applications, policies, and procedures to meet business and compliance requirements. Providing you with a foundation in cryptography, it keeps things simple regarding symmetric versus asymmetric cryptography, and only refers to algorithms in general, without going too deeply into complex mathematics.

Presenting comprehensive and in-depth coverage of confidentiality, integrity, authentication, non-repudiation, privacy, and key management, this book supplies authoritative insight into the commonalities and differences of various users, providers, and regulators in the U.S. and abroad.

レビュー

Jeff's extensive practical experience in applying information security and his expertise in cryptographic standards makes this book a must-read for the information security professional. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity deserves a place in your reference library.
―Ralph Spencer Poore, CFE, CISA, CISSP, CHS-III, PCIP, ISSA Distinguished Fellow, ISSA Honor Roll

Having worked at the same consulting firm and also on a project with author J.J. Stapleton (full disclosure); I knew he was a really smart guy. In Security without Obscurity: A Guide to Confidentiality, Authentication and Integrity, Stapleton shows how broad his security knowledge is to the world. When it comes to the world of encryption and cryptography, Stapleton has had his hand in a lot of different cryptographic pies. He has been part of cryptographic accreditation committees for many different standard bodies across the globe. ... Those looking for a highly technical overview, interoperability guidance, and overall reference will find the book most rewarding. ... One of the ways Stapleton brings his broad experience to the book is in the many areas where he compares different types of cryptosystems, technologies and algorithms. This enables the reader to understand what the appropriate type of authentication is most beneficial for the specific requirement. ... For anyone looking for an authoritative text on how to fully implement cross-platform security and authentication across the enterprise, this is a valuable reference to get that job done.
―Book review by Ben Rothke, writing on slashdot.org
View the full review at: http://books.slashdot.org/story/14/06/16/1245237/book-review-security-without-obscurity


… the author is well qualified to assay the vital information technology field of computer network security … The text is peppered with instructive figures and tables … very clearly written …
―John Maxymuk for ARBAonline

商品の説明をすべて表示する

登録情報

  • ハードカバー: 355ページ
  • 出版社: Auerbach Publications; 1版 (2014/5/12)
  • 言語: 英語
  • ISBN-10: 1466592141
  • ISBN-13: 978-1466592148
  • 発売日: 2014/5/12
  • 商品パッケージの寸法: 16.5 x 3.2 x 24.1 cm
  • おすすめ度: この商品の最初のレビューを書き込んでください。
  • さらに安い価格について知らせる
    この商品を出品する場合、出品者サポートを通じて更新を提案したいですか?

  • 目次を見る

まだカスタマーレビューはありません


この商品をレビュー

他のお客様にも意見を伝えましょう

Amazon.com で最も参考になったカスタマーレビュー

Amazon.com: 5つ星のうち4.5 2 件のカスタマーレビュー
a-mused
5つ星のうち5.0Recommended for practical security roles and those with an interest in the subject.
2014年8月9日 - (Amazon.com)
Amazonで購入
Ben Rothke
5つ星のうち4.0Great guide to enterprise authentication from an expert
2014年6月17日 - (Amazon.com)
5人のお客様がこれが役に立ったと考えています