logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Real-World Cryptography by David Wong ISBN 9781617296710, 1617296716

  • SKU: EBN-34434612
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

5.0

41 reviews
Instant download (eBook) Real-World Cryptography after payment.
Authors:David Wong
Pages:400 pages.
Year:2021
Editon:1
Publisher:Manning Publications
Language:english
File Size:37.43 MB
Format:pdf
ISBNS:9781617296710, 1617296716
Categories: Ebooks

Product desciption

(Ebook) Real-World Cryptography by David Wong ISBN 9781617296710, 1617296716

An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications.
In Real-World Cryptography, you will find:
• Best practices for using cryptography
• Diagrams and explanations of cryptographic algorithms
• Implementing digital signatures and zero-knowledge proofs
• Specialized hardware for attacks and highly adversarial environments
• Identifying and fixing bad practices
• Choosing the right cryptographic tool for any problem
Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You’ll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice.
about the technology
Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations.
about the book
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You’ll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read—and it might just save your bacon the next time you’re targeted by an adversary after your data.
what's inside
• Implementing digital signatures and zero-knowledge proofs
• Specialized hardware for attacks and highly adversarial environments
• Identifying and fixing bad practices
• Choosing the right cryptographic tool for any problem
about the reader
For cryptography beginners with no previous experience in the field.
about the author
David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security.
Table of Contents
PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY
1 Introduction
2 Hash functions
3 Message authentication codes
4 Authenticated encryption
5 Key exchanges
6 Asymmetric encryption and hybrid encryption
7 Signatures and zero-knowledge proofs
8 Randomness and secrets
PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY
9 Secure transport
10 End-to-end encryption
11 User authentication
12 Crypto as in cryptocurrency?
13 Hardware cryptography
14 Post-quantum cryptography
15 Is this it? Next-generation cryptography
16 When and where cryptography fails
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products