Modern Cryptography: Applied Mathematics for Encryption and Information Security Modern Cryptography: Applied Mathematics for Encryption and Information Security

Modern Cryptography: Applied Mathematics for Encryption and Information Security

    • ‏35٫99 US$
    • ‏35٫99 US$

وصف الناشر

This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required

Cryptography underpins today’s cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods.

The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture—full explanations of real-world applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise—the reader will be exposed to only the formulas and equations needed to master the art of cryptography.

Concisely explains complex formulas and equations and makes the math easy

Teaches even the information security novice critical encryption skills

Written by a globally-recognized security expert who has taught cryptography to various government and civilian groups and organizations around the world

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠١٥
٩ أكتوبر
اللغة
EN
الإنجليزية
عدد الصفحات
٦٠٨
الناشر
McGraw Hill LLC
البائع
The McGraw-Hill Companies, Inc.
الحجم
٢٩
‫م.ب.‬
Applied Cryptography Applied Cryptography
٢٠١٧
Cryptography Engineering Cryptography Engineering
٢٠١١
Official (ISC)2  Guide to the CISSP CBK Official (ISC)2  Guide to the CISSP CBK
٢٠١٢
Implementing SSL / TLS Using Cryptography and PKI Implementing SSL / TLS Using Cryptography and PKI
٢٠١١
The Secret Life of Programs The Secret Life of Programs
٢٠١٩
The Beauty of Computation The Beauty of Computation
٢٠١٣
CCFP Certified Cyber Forensics Professional Certification CCFP Certified Cyber Forensics Professional Certification
٢٠١٤
An In-Depth Guide to Mobile Device Forensics An In-Depth Guide to Mobile Device Forensics
٢٠٢١
Computer Security Fundamentals Computer Security Fundamentals
٢٠١٩
Hardware for Quantum Computing Hardware for Quantum Computing
٢٠٢٤
Windows Forensics Windows Forensics
٢٠٢٤
The NICE Cyber Security Framework The NICE Cyber Security Framework
٢٠٢٠