Modern Cryptography: Applied Mathematics for Encryption and Information Security Modern Cryptography: Applied Mathematics for Encryption and Information Security

Modern Cryptography: Applied Mathematics for Encryption and Information Security

    • $35.99
    • $35.99

Publisher Description

This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required

Cryptography underpins today’s cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods.

The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture—full explanations of real-world applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise—the reader will be exposed to only the formulas and equations needed to master the art of cryptography.

Concisely explains complex formulas and equations and makes the math easy

Teaches even the information security novice critical encryption skills

Written by a globally-recognized security expert who has taught cryptography to various government and civilian groups and organizations around the world

GENRE
Computers & Internet
RELEASED
2015
October 9
LANGUAGE
EN
English
LENGTH
608
Pages
PUBLISHER
McGraw Hill LLC
SELLER
The McGraw-Hill Companies, Inc.
SIZE
29
MB
Applied Cryptography Applied Cryptography
2017
Cryptography Engineering Cryptography Engineering
2011
Official (ISC)2  Guide to the CISSP CBK Official (ISC)2  Guide to the CISSP CBK
2012
Implementing SSL / TLS Using Cryptography and PKI Implementing SSL / TLS Using Cryptography and PKI
2011
The Secret Life of Programs The Secret Life of Programs
2019
The Beauty of Computation The Beauty of Computation
2013
CCFP Certified Cyber Forensics Professional Certification CCFP Certified Cyber Forensics Professional Certification
2014
An In-Depth Guide to Mobile Device Forensics An In-Depth Guide to Mobile Device Forensics
2021
Computer Security Fundamentals Computer Security Fundamentals
2019
Hardware for Quantum Computing Hardware for Quantum Computing
2024
Windows Forensics Windows Forensics
2024
The NICE Cyber Security Framework The NICE Cyber Security Framework
2020