000 | 02928cam a2200433 i 4500 | ||
---|---|---|---|
999 |
_c270 _d270 |
||
001 | 19608545 | ||
005 | 20220210114919.0 | ||
008 | 170420s2018 caua b 001 0 eng d | ||
010 | _a 2017940486 | ||
020 |
_a9781593278267 _qpaperback |
||
020 |
_a1593278268 _qpaperback |
||
035 | _a(OCoLC)ocn986236585 | ||
040 |
_aBTCTA _beng _cBTCTA _dYDX _dBDX _dORX _dFM0 _dSINLB _dNYP _dOCLCF _dEG-CaTKH _erda |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aQA76.9.A25 _bA96 2018 |
082 | 0 | 0 |
_a005.824 AU.S 2018 _223 |
100 | 1 |
_aAumasson, Jean-Philippe, _eauthor. |
|
245 | 1 | 0 |
_aSerious cryptography : _ba practical introduction to modern encryption / _cJean-Philippe Aumasson ; foreword by Matthew D. Green. |
264 | 1 |
_aSan Francisco : _bNo Starch Press, _c2018. |
|
300 |
_axxii, 282 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aEncryption -- Randomness -- Cryptographic security -- Block ciphers -- Stream ciphers -- Hash functions -- Keyed hashing -- Authenticated encryption -- Hard problems -- RSA -- Diffie-Hellman -- Elliptic curves -- TLS -- Quantum and post-quantum. | |
520 | _aThis practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You'll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography. You'll also learn: Key concepts in cryptography, such as computational security, attacker models, and forward secrecy; The strengths and limitations of the TLS protocol behind HTTPS secure websites; Quantum computation and post-quantum cryptography; About various vulnerabilities by examining numerous code examples and use cases; How to choose the best algorithm or protocol and ask vendors the right questions Each chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you're a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications. | ||
650 | 0 | _aData encryption (Computer science) | |
650 | 0 |
_aInformation technology _xSecurity measures. |
|
650 | 0 |
_aComputer security _xManagement. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aData protection. | |
700 | 1 |
_aGreen, Matthew D., _ewriter of foreword. |
|
942 |
_2ddc _cBK |
||
998 |
_ahuda.mahmoud _bM _d20220210 |
||
998 |
_amona.romia _bR _d20220210 |
||
906 |
_a7 _bcbc _ccopycat _d2 _eepcn _f20 _gy-gencatlg |