ABSTRACT

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurit

chapter 1|56 pages

Introduction

chapter 2|34 pages

Confidentiality

chapter 3|78 pages

Authentication

chapter 4|30 pages

Integrity

chapter 5|12 pages

Nonrepudiation

chapter 6|26 pages

Privacy

chapter 7|76 pages

Key Management