Real-world cryptography

Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There's no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You'll learn building blocks like hash...

Full description

Bibliographic Details
Main Author: Wong, David
Format: eBook
Language:English
Published: Shelter Island, NY Manning Publications Company 2021
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02077nmm a2200457 u 4500
001 EB002004224
003 EBX01000000000000001167125
005 00000000000000.0
007 cr|||||||||||||||||||||
008 211025 ||| eng
020 |a 1638350841 
020 |a 9781617296710 
020 |a 9781638350842 
050 4 |a QA76.9.A25 
100 1 |a Wong, David 
245 0 0 |a Real-world cryptography  |c David Wong 
260 |a Shelter Island, NY  |b Manning Publications Company  |c 2021 
300 |a 1 online resource 
505 0 |a Includes bibliographical references and index 
653 |a Sécurité informatique 
653 |a Computer Communication Networks 
653 |a Réseaux d'ordinateurs 
653 |a Cryptographie 
653 |a Computer networks / fast 
653 |a Cryptography / http://id.loc.gov/authorities/subjects/sh85034453 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Computer networks / http://id.loc.gov/authorities/subjects/sh85029513 
653 |a Computer security / fast 
653 |a Cryptography / fast 
653 |a Computer Security 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9781617296710 
776 |z 1638350841 
776 |z 9781638350842 
776 |z 9781617296710 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781617296710/?ar  |x Verlag  |3 Volltext 
082 0 |a 384 
082 0 |a 331 
082 0 |a 005.82 
520 |a Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There's no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You'll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read--and it might just save your bacon the next time you're targeted by an adversary after your data. -- Publisher