Kirjahaku
Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.
1000 tulosta hakusanalla J.J Crooks
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author’s knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards. Starting with the fundamentals, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication. The text delves beyond the typical cryptographic abstracts of encryption and digital signatures as the fundamental security controls to explain how to implement them into applications, policies, and procedures to meet business and compliance requirements. Providing you with a foundation in cryptography, it keeps things simple regarding symmetric versus asymmetric cryptography, and only refers to algorithms in general, without going too deeply into complex mathematics.Presenting comprehensive and in-depth coverage of confidentiality, integrity, authentication, non-repudiation, privacy, and key management, this book supplies authoritative insight into the commonalities and differences of various users, providers, and regulators in the U.S. and abroad.
This book is the story of the marriage of a new techl}ology, computers, with an old problem, the study of neuroanatomical structures using the light microscope. It is aimed toward you, the neuroanatomist, who until now have used computers primarily for word processing but now wish to use them also to collect and analyze your laboratory data. Mter reading the book, you will be better equipped to use a computer system for data collection and analysis, to employ a programmer who might develop a system for you, or to evaluate the systems available in the marketplace. To start toward this goal, a glossary first presents commonly used terms in computer assisted neuroanatomy. This, on its own, will aid you as it merges the jargon of the two different fields. Then, Chapter 1 presents a historical review to describe the manual tasks involved in presenting and measuring anatomic structures. This review lays a base line of the tasks that were done before computers and the amount of skill and time needed to perform the tasks. In Chapters 2 and 3, you will find basic information about laboratory computers and programs to the depth required for you to use the machines easily and talk with some fluency to computer engineers, programmers, and salesmen. Chapters 4, 5, and 6 present the use of computers to reconstruct anatomic structures, i.e., to enter them into a computer memory, where they are later displayed and analyzed.