Cryptography

Nonfiction, Computers, Advanced Computing, Engineering, Computer Engineering, Networking & Communications, Computer Security, Operating Systems
Cover of the book Cryptography by William J. Buchanan, River Publishers
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: William J. Buchanan ISBN: 9788793609969
Publisher: River Publishers Publication: September 27, 2017
Imprint: River Publishers Language: English
Author: William J. Buchanan
ISBN: 9788793609969
Publisher: River Publishers
Publication: September 27, 2017
Imprint: River Publishers
Language: English

Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography and provide understanding of how privacy, identity provision, and integrity can be enhanced with the usage of encryption.

The book has many novel features including: full provision of web-based material on almost every topic covered; provision of additional on-line material such as videos, source code, and labs; and coverage of emerging areas such as Blockchain, Light-weight Cryptography, and Zero-knowledge Proofs.

Key areas covered include: Fundamentals of Encryption, Public Key Encryption, Symmetric Key Encryption, Hashing Methods, Key Exchange Methods, Digital Certificates and Authentication, Tunneling, Crypto Cracking, Light-weight Cryptography, Blockchain, and Zero-knowledge Proofs.

This book provides extensive support through the associated website of: http://asecuritysite.com/encryption

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography and provide understanding of how privacy, identity provision, and integrity can be enhanced with the usage of encryption.

The book has many novel features including: full provision of web-based material on almost every topic covered; provision of additional on-line material such as videos, source code, and labs; and coverage of emerging areas such as Blockchain, Light-weight Cryptography, and Zero-knowledge Proofs.

Key areas covered include: Fundamentals of Encryption, Public Key Encryption, Symmetric Key Encryption, Hashing Methods, Key Exchange Methods, Digital Certificates and Authentication, Tunneling, Crypto Cracking, Light-weight Cryptography, Blockchain, and Zero-knowledge Proofs.

This book provides extensive support through the associated website of: http://asecuritysite.com/encryption

More books from Operating Systems

Cover of the book Information Protection Playbook by William J. Buchanan
Cover of the book Instant Hyper-V Server Virtualization Starter by William J. Buchanan
Cover of the book The Windows 8 Beginner's Guide by William J. Buchanan
Cover of the book Computer Security by William J. Buchanan
Cover of the book Real World Mac Maintenance and Backups by William J. Buchanan
Cover of the book Security Risk Management by William J. Buchanan
Cover of the book Photoshop CS2 RAW by William J. Buchanan
Cover of the book Serverless Integration Design Patterns with Azure by William J. Buchanan
Cover of the book Windows Forensics Cookbook by William J. Buchanan
Cover of the book Automated Firewall Analytics by William J. Buchanan
Cover of the book Linux for Business People by William J. Buchanan
Cover of the book PRIMA Password-Kiste by William J. Buchanan
Cover of the book OS X Yosemite All-in-One For Dummies by William J. Buchanan
Cover of the book Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP by William J. Buchanan
Cover of the book Extending Ansible by William J. Buchanan
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy