Dec

13

2019

Real-World Cryptography

smack 13 Dec 2019 01:56 LEARNING » e-book

Real-World Cryptography


April 2020 | ISBN:9781617296710 | English | 148 pages | True (PDF, EPUB, MOBI) | 12 MB

If you're browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you're relying on cryptography. And you're probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It's important to understand these tools so you can make the best decisions about how, where, and why to use them. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications.
About the Technology
Cryptography is the foundation of information security. This simultaneously ancient and emerging science is based on encryption and secure communication using algorithms that are hard to crack even for high-powered computer systems. Cryptography protects privacy, secures online activity, and defends confidential information, such as credit cards, from attackers and thieves. Without cryptographic techniques allowing for easy encrypting and decrypting of data, almost all IT infrastructure would be vulnerable.
About the book
Real-World Cryptography helps you understand the cryptographic techniques at work in common tools, frameworks, and protocols so you can make excellent security choices for your systems and applications. There's no unnecessary theory or jargon-just the most up-to-date techniques you'll need in your day-to-day work as a developer or systems administrator. Cryptography expert David Wong takes you hands-on with cryptography building blocks such as hash functions and key exchanges, then shows you how to use them as part of your security protocols and applications. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, password-authenticated key exchange, and post-quantum cryptography. Throughout, all techniques are fully illustrated with diagrams and real-world use cases so you can easily see how to put them into practice.
What's inside

Best practices for using cryptography
Diagrams and explanations of cryptographic algorithms
Identifying and fixing cryptography bad practices in applications
Picking the right cryptographic tool to solve problems

About the reader
For cryptography beginners with no previous experience in the field.
[i][/i]

Buy Premium Account for Download With Full Speed:

rapidgator_net:
https://rapidgator.net/file/bcdfda60a4c469a500efbb659fd79a1f

nitroflare_com:
http://nitroflare.com/view/2ECB1662E9D7651/Real-World_Cryptography.zip


Links are Interchangeable - No Password - Single Extraction

High Speed Download

Add Comment

  • People and smileys emojis
    Animals and nature emojis
    Food and drinks emojis
    Activities emojis
    Travelling and places emojis
    Objects emojis
    Symbols emojis
    Flags emojis