Modern Cryptography

Product information

€72.50

Stock: In Stock Online

Our USPs

Free Delivery
Extended Range: Delivery 3-4 working days
Dubray Rewards
Earn 290 Reward Points on this title

Modern Cryptography

Product information

Author: Sandip Dholakia

Type: PAPERBACK

ISBN: 9781493225651

Date: 24th October, 2024

Publisher: RHEINWERK COMPUTING

  1. Categories

  2. Computer Security

Description

Security professionals, you know encryption is essential to protect your data. In this book, learn about the fundamental concepts of cryptography--and then apply them! Explore algorithms for symmetric and asymmetric cryptography and see how to use encryption strategies to enforce storage and network security. Put modern cryptography principles to work in real-world scenarios: cloud environments, cryptocurrency, artificial intelligence, quantum computing, and more. Build the cryptography skills you need to manage today's security threats! In this book, you'll learn about: a. Cryptography Concepts Master the theory behind cryptography. Walk through the principles, methods, and algorithms that are used to protect your data. Ensure data confidentiality, integrity, and authenticity using techniques such as hash functions, digital signatures, and MAC. b. Practical Applications Learn about modern cryptography in practice. From managing encryption keys in the cloud, to securing AI systems and machine learning models, to developing quantum-resistant cryptography algorithms, see how cryptography is used to protect data. c. Expert Tips, Examples, and Best Practices Unravel cryptography topics with guidance from an experienced security professional. Practical demonstrations, detailed formulas, and tips and tricks will help you navigate the complex world of data encryption. Highlights include: 1) Symmetric and asymmetric encryption 2) Hash functions 3) Digital signatures 4) Message authentication codes (MAC) 5) Storage and network security 6) Encryption key management 7) Cloud cryptography 8) Lightweight cryptography 9) Cryptocurrencies 10) Artificial intelligence and IoT 11) Quantum computing 12) Homomorphic encryption 13) Standards and best practices

Additional details