Cargando…

Real-world cryptography /

A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security. Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security cho...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wong, David (Cryptography engineer) (Autor)
Otros Autores: Dysart, Derek (Narrador)
Formato: Electrónico Audiom
Idioma:Inglés
Publicado: [Shelter Island, New York] : Manning Publications Co., 2021.
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cim a22000007i 4500
001 OR_on1313562390
003 OCoLC
005 20231017213018.0
006 m o h
007 sz zunnnnnuneu
007 cr nnannnuuuuu
008 220502s2021 nyunnnn o z n eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d ORMDA  |d OCLCO  |d OCLCF 
024 8 |a 9781617296710AU  |q (electronic audio bk.) 
029 1 |a AU@  |b 000071968801 
035 |a (OCoLC)1313562390 
037 |a 9781617296710AU  |b O'Reilly Media 
050 4 |a QA76.9.A25  |b W6585 2021eab 
082 0 4 |a 005.82  |2 23/eng/20220502 
049 |a UAMI 
100 1 |a Wong, David  |c (Cryptography engineer),  |e author. 
245 1 0 |a Real-world cryptography /  |c David Wong. 
250 |a [First edition]. 
264 1 |a [Shelter Island, New York] :  |b Manning Publications Co.,  |c 2021. 
300 |a 1 online resource (1 sound file (13 hr., 50 min.)) 
306 |a 135000 
336 |a spoken word  |b spw  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a audio file  |2 rdaft 
511 0 |a Read by Derek Dysart. 
520 |a A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security. Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications. In Real-World Cryptography you will find: Best practices for using cryptography Diagrams and explanations of cryptographic algorithms Implementing digital signatures and zero-knowledge proofs Specialized hardware for attacks and highly adversarial environments Identifying and fixing bad practices Choosing the right cryptographic tool for any problem Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You'll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice. about the technology Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations. about the book Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There's no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You'll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to listen to--and it might just save your bacon the next time you're targeted by an adversary after your data. about the audience For cryptography beginners with no previous experience in the field. about the author David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security. Covers all the important parts of applied cryptography. A must-read for every Java developer. Harald Kuhn, TurnFriendly An in-depth introduction to cryptography, covering hot topics like blockchain and quantum computing. Gábor László Hajba, ProLion A best-in-category book that takes you all the way from curious novice to confident practitioner. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed May 2, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Cryptography. 
650 0 |a Computer networks. 
650 2 |a Computer Security 
650 2 |a Computer Communication Networks 
650 6 |a Sécurité informatique. 
650 6 |a Cryptographie. 
650 6 |a Réseaux d'ordinateurs. 
650 7 |a Computer networks.  |2 fast  |0 (OCoLC)fst00872297 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
655 4 |a Downloadable audio books. 
655 7 |a Audiobooks.  |2 fast  |0 (OCoLC)fst01726208 
655 7 |a Audiobooks.  |2 lcgft 
655 7 |a Livres audio.  |2 rvmgf 
700 1 |a Dysart, Derek,  |e narrator. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781617296710AU/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP