Real-world cryptography

To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautifu...

Full description

Bibliographic Details
Format: eBook
Language:English
Published: [Place of publication not identified] Manning Publications 2021
Edition:Video edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04471nmm a2200409 u 4500
001 EB002009054
003 EBX01000000000000001171954
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220121 ||| eng
050 4 |a QA76.9.A25 
100 1 |a Wong, David  |e presenter 
245 0 0 |a Real-world cryptography  |c David Wong 
250 |a Video edition 
260 |a [Place of publication not identified]  |b Manning Publications  |c 2021 
300 |a 1 video file (13 hr., 55 min.)  |b sound, color 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Cryptography / fast / (OCoLC)fst00884552 
653 |a Computer security / fast / (OCoLC)fst00872484 
653 |a Réseaux d'ordinateurs 
653 |a Sécurité informatique 
653 |a Computer networks / http://id.loc.gov/authorities/subjects/sh85029513 
653 |a Computer Communication Networks 
653 |a Cryptographie 
653 |a Computer networks / fast / (OCoLC)fst00872297 
653 |a Computer Security 
653 |a Cryptography / http://id.loc.gov/authorities/subjects/sh85034453 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
856 4 0 |u https://learning.oreilly.com/videos/~/9781617296710VE/?ar  |x Verlag  |3 Volltext 
082 0 |a 384 
082 0 |a 005.82 
082 0 |a 331 
520 |a To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations. about the book Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There's no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You'll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to listen to--and it might just save your bacon the next time you're targeted by an adversary after your data.  
520 |a In Real-World Cryptography you will find: Best practices for using cryptography Diagrams and explanations of cryptographic algorithms Implementing digital signatures and zero-knowledge proofs Specialized hardware for attacks and highly adversarial environments Identifying and fixing bad practices Choosing the right cryptographic tool for any problem Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You'll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice. about the technology Cryptography is the essential foundation of IT security.  
520 |a In Video Editions the narrator reads the book while the content, figures, code listings, diagrams, and text appear on the screen. Like an audiobook that you can also watch as a video. A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security. Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications.  
520 |a about the audience For cryptography beginners with no previous experience in the field. about the author David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security. Covers all the important parts of applied cryptography. A must-read for every Java developer. Harald Kuhn, TurnFriendly An in-depth introduction to cryptography, covering hot topics like blockchain and quantum computing. Gábor László Hajba, ProLion A best-in-category book that takes you all the way from curious novice to confident practitioner. William Rudenmalm, Creandum NARRATED BY DEREK DYSART.