Détail de l'auteur
Auteur EASTTOM Chuck |
Documents disponibles écrits par cet auteur
Affiner la recherche Interroger des sources externes
Titre : Modern cryptography : applied mathematics for encryption and information security. Type de document : texte imprimé Auteurs : EASTTOM Chuck, Auteur Mention d'édition : 2 nd edition Editeur : Springer, Suisse Année de publication : 2022 ISBN/ISSN/EAN : 978-3-031-12303-0 Langues : Anglais (eng) Catégories : Informatique
Informatique:programmes
Informatique:programmes:Sécurité des donnéesIndex. décimale : 005.8 Sécurité des données. Protection contre le piratage informatique Résumé : This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. Modern cryptography : applied mathematics for encryption and information security. [texte imprimé] / EASTTOM Chuck, Auteur . - 2 nd edition . - [S.l.] : Springer, Suisse, 2022.
ISBN : 978-3-031-12303-0
Langues : Anglais (eng)
Catégories : Informatique
Informatique:programmes
Informatique:programmes:Sécurité des donnéesIndex. décimale : 005.8 Sécurité des données. Protection contre le piratage informatique Résumé : This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. Exemplaires
Code-barres Cote Support Localisation Section Disponibilité aucun exemplaire
Titre : Modern cryptography : applied mathematics for encryption and information security. Type de document : texte imprimé Auteurs : EASTTOM Chuck, Auteur Mention d'édition : 2 nd edition Editeur : Springer, Suisse Année de publication : 2022 ISBN/ISSN/EAN : 978-3-031-12303-0 Langues : Anglais (eng) Catégories : Informatique
Informatique:programmes
Informatique:programmes:Sécurité des donnéesIndex. décimale : 005.8 Sécurité des données. Protection contre le piratage informatique Résumé : This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. Modern cryptography : applied mathematics for encryption and information security. [texte imprimé] / EASTTOM Chuck, Auteur . - 2 nd edition . - [S.l.] : Springer, Suisse, 2022.
ISBN : 978-3-031-12303-0
Langues : Anglais (eng)
Catégories : Informatique
Informatique:programmes
Informatique:programmes:Sécurité des donnéesIndex. décimale : 005.8 Sécurité des données. Protection contre le piratage informatique Résumé : This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. Exemplaires (2)
Code-barres Cote Support Localisation Section Disponibilité 9783031123030MIT001 005.8/036 Livre Maths&Informatique Fonds informatique Disponible 9783031123030MIT002 005.8/036 Livre Maths&Informatique Fonds informatique Disponible

