Ten Modern Cryptographic Algorithms
Seiten
2024
No Starch Press,US (Verlag)
978-1-7185-0366-3 (ISBN)
No Starch Press,US (Verlag)
978-1-7185-0366-3 (ISBN)
- Noch nicht erschienen (ca. November 2024)
- Versandkostenfrei innerhalb Deutschlands
- Auch auf Rechnung
- Verfügbarkeit in der Filiale vor Ort prüfen
- Artikel merken
Learn the history, operation, applications (and flaws) of 10 key algorithms that have shaped cryptographic data protection.
Algorithms are critical to online cryptographic data protection, and this book gives you a tour of the 10 most significant among them—covering their operation, applications, and flaws. Through real-world examples using each algorithm, you’ll get a big-picture view of why cryptography matters and how it can help keep our everyday networked environments safe.
Rather than focusing on mathematical and computational theory, the author—an award-winning scholar—demonstrates how to select the right solution for real-world security problems. Each chapter gives an in-depth understanding of a different algorithm, discussing its history, operation, and applications for data protection. You’ll learn how these algorithms operate in practice, without sacrificing mathematical rigor. You’ll also learn how the algorithms were improved over time, giving you an in-depth understanding of the history of their development and how to work with their existing flaws.
Algorithms are critical to online cryptographic data protection, and this book gives you a tour of the 10 most significant among them—covering their operation, applications, and flaws. Through real-world examples using each algorithm, you’ll get a big-picture view of why cryptography matters and how it can help keep our everyday networked environments safe.
Rather than focusing on mathematical and computational theory, the author—an award-winning scholar—demonstrates how to select the right solution for real-world security problems. Each chapter gives an in-depth understanding of a different algorithm, discussing its history, operation, and applications for data protection. You’ll learn how these algorithms operate in practice, without sacrificing mathematical rigor. You’ll also learn how the algorithms were improved over time, giving you an in-depth understanding of the history of their development and how to work with their existing flaws.
Renita Murimi is an associate professor of cybersecurity at the University of Dallas, having received both her PhD and MS in electrical engineering from New Jersey Institute of Technology. Her research interests are in the field of cybersecurity, network science, and blockchain, and have been published in over 40 book chapters and journal articles. As an educator, she’s been the recipient of the Bill and Melinda Gates Grand Challenges Exploration Award, and the Haggar Scholar and Haggerty Teaching Excellence Awards at the University of Dallas.
Erscheint lt. Verlag | 19.11.2024 |
---|---|
Verlagsort | San Francisco |
Sprache | englisch |
Maße | 178 x 235 mm |
Gewicht | 369 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-7185-0366-0 / 1718503660 |
ISBN-13 | 978-1-7185-0366-3 / 9781718503663 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99 €
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
69,99 €