Computer Security and Cryptography
5/5
()
About this ebook
This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.
The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.
Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.
Three basic types of chapters are featured to facilitate learning:
- Chapters that develop technical skills
- Chapters that describe a cryptosystem and present a method of analysis
- Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions
With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.
Related to Computer Security and Cryptography
Related ebooks
A Guidebook to Fortran on Supercomputers Rating: 0 out of 5 stars0 ratingsNetworking and Online Games: Understanding and Engineering Multiplayer Internet Games Rating: 5 out of 5 stars5/5Introduction to the Theory of Error-Correcting Codes Rating: 0 out of 5 stars0 ratingsFinite Automata: Behavior and Synthesis Rating: 5 out of 5 stars5/5Engineering a Compiler Rating: 0 out of 5 stars0 ratingsHands-on Booting: Learn the Boot Process of Linux, Windows, and Unix Rating: 0 out of 5 stars0 ratingsExploring C++20: The Programmer's Introduction to C++ Rating: 0 out of 5 stars0 ratingsQuantum Machine Learning with Python: Using Cirq from Google Research and IBM Qiskit Rating: 5 out of 5 stars5/5Robot Brains: Circuits and Systems for Conscious Machines Rating: 5 out of 5 stars5/5CompTIA Linux+ and LPIC Practice Tests: Exams LX0-103/LPIC-1 101-400, LX0-104/LPIC-1 102-400, LPIC-2 201, and LPIC-2 202 Rating: 0 out of 5 stars0 ratingsTorque 3D Game Development Cookbook Rating: 0 out of 5 stars0 ratingsThor's Microsoft Security Bible: A Collection of Practical Security Techniques Rating: 0 out of 5 stars0 ratingsDecoupled Django: Understand and Build Decoupled Django Architectures for JavaScript Front-ends Rating: 0 out of 5 stars0 ratingsRadar Propagation and Scattering in a Complex Maritime Environment: Modeling and Simulation from MatLab Rating: 0 out of 5 stars0 ratingsPseudorandomness and Cryptographic Applications Rating: 0 out of 5 stars0 ratingsThe Arithmetic of Elliptic Curves Rating: 5 out of 5 stars5/5Clojure High Performance Programming - Second Edition Rating: 0 out of 5 stars0 ratingsBeginning Game Programming with Pygame Zero: Coding Interactive Games on Raspberry Pi Using Python Rating: 0 out of 5 stars0 ratingsPython AI Programming Rating: 0 out of 5 stars0 ratingsMeasurements and Time Reversal in Objective Quantum Theory: International Series in Natural Philosophy Rating: 0 out of 5 stars0 ratingsMachine Learning for Future Fiber-Optic Communication Systems Rating: 0 out of 5 stars0 ratingsEmbedded FreeBSD Cookbook Rating: 0 out of 5 stars0 ratingsOptimizing Visual Studio Code for Python Development: Developing More Efficient and Effective Programs in Python Rating: 0 out of 5 stars0 ratingsProfessional Assembly Language Rating: 4 out of 5 stars4/5Advance Chess: Quiet Reflection of the Double Set Game: The Symbiosis of Full Spectrum Inferences Rating: 0 out of 5 stars0 ratingsChoose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners Rating: 0 out of 5 stars0 ratingsWebAssembly Essentials Rating: 0 out of 5 stars0 ratingsDeep Learning for Natural Language Processing: Creating Neural Networks with Python Rating: 0 out of 5 stars0 ratingsA Survey of Combinatorial Theory Rating: 0 out of 5 stars0 ratingsFreeBSD Mastery: Advanced ZFS: IT Mastery, #9 Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsDestination CISSP Rating: 3 out of 5 stars3/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5Real-World Cryptography Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Hacking : Guide to Computer Hacking and Penetration Testing Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5
Reviews for Computer Security and Cryptography
1 rating1 review
- Rating: 5 out of 5 stars5/5goooooood