000 | 02436cam a2200277 i 4500 | ||
---|---|---|---|
001 | 0000094310 | ||
003 | 0001 | ||
008 | 180421s2016 nyua b 001 0 eng | ||
020 |
_a9781259588082 (paperback) _qpaperback |
||
020 |
_a1259588084 _qpaperback |
||
040 |
_aDLC _erda _beng _cDLC _dYDX _dCDX _dYDXCP _dCHVBK |
||
042 | _apcc | ||
082 | 0 | 0 |
_a005.82 _223 |
084 |
_a005.82 _bEAS-M |
||
100 | 1 |
_aEasttom, Chuck, _eauthor. |
|
245 | 1 | 0 |
_aModern cryptography : _h[Book] _bapplied mathematics for encryption and information security / _cChuck Easttom. |
300 |
_axix, 394 pages : _billustrations ; _c23 cm |
||
365 |
_a01 _b0.00 |
||
520 | _aA Practical Guide to Cryptography Principles and Security Practices Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors. Learn the necessary number theory, discrete math, and algebra Employ symmetric ciphers, including Feistel and substitution-permutation ciphers Understand asymmetric cryptography algorithms Design s-boxes that maximize output non-linearity Deploy cryptographic hashes Create cryptographic keys using pseudo random number generators Encrypt Web traffic using SSL/TLS Secure VPN, WiFi, and SSH communications Work with cryptanalysis and steganography Explore government, military, and intelligence agency applications This book is meant for those without a strong mathematics backgound. Only just enough math to understand the algorithms is given. The idea of the book is to be a gateway to enter the world of cryptography. | ||
521 | _aAll. | ||
650 | 0 | _aData encryption (Computer science) | |
650 | 0 |
_aInformation networks _xSecurity measures _xMathematics. |
|
650 | 0 |
_aComputer networks _xSecurity measures _xMathematics. |
|
650 | 0 |
_aComputer security _xMathematics. |
|
852 |
_p58068 _96099.84 _h005.82 EAS-M _vProgressive International Agencies Pvt. Ltd. CUI Lahore _bGround Floor _dBooks _t1 _q1-New _aJZL-CUI |
||
999 |
_c65827 _d65827 |