- 中图分类号: TP3
- 语种: ENG
- 出版信息: Packt Publishing 2024 411页
- EISBN: 9781835087978
- PISBN-P: 9781835080030
- 原文访问地址:
KG评星
知识图谱评星,是一种基于用户使用的评价体系,综合图书的评论数量、引文数量、Amazon评分以及图谱网络中节点的PageRank值(即考虑相邻节点数量和重要性)等多种因素计算而得出的评价数值。星级越高,推荐值越高。CAT核心级
核心学术资源(CAR)项目作为教图公司推出的一项知识型服务,旨在打造一套科学、有效的图书评价体系,并协助用户制定相应的馆藏建设方案。CAR项目调查和分析12所世界一流大学的藏书数据,以收藏学校的数量确定书目的核心级,核心级越高,代表书目的馆藏价值越高。选取核心级在三级以上,即三校以上共藏的图书作为核心书目(CAT)。Get a head start in real-world cryptography by learning the logic of algorithms that defend against attacks, and explore the latest in IoT homomorphic encryption and quantum cryptography Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features: * Explore the basic principles and history of cryptography * Identify key vulnerabilities and evaluate how cryptographic algorithms defend against attacks * Become a forward-thinking cryptographer by learning the new protocols in zero knowledge, homomorphic encryption and quantum cryptography Book Description: This updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration of its history, principles, and the latest cutting-edge developments. You will learn the mathematical logic of how algorithms encrypt and decrypt messages, introducing more complex math as the book progresses. By getting your foot in the door with how elliptic curves, zero knowledge protocols, homomorphic encryption, and quantum computing shape today’s cybersecurity landscape and its attacks and defenses, you will have the groundwork on which to build professional cryptographic experience. This edition will help keep you up to date with the most innovative cryptographic algorithms, ensuring you're well-prepared to navigate the rapidly evolving world of data privacy and cybersecurity. With a focus on emerging trends and challenges, including quantum cryptography you'll acquire the knowledge needed to stay at the forefront of this dynamic field. With the latest updates and an expanded scope, this new edition ensures you're well-prepared to face the ever-evolving landscape of cybersecurity with confidence and expertise. What you will learn: * Get to grips with essential encryption algorithms and their logical basics * Identify the key vulnerabilities of AES, RSA, and many other symmetric and asymmetric algorithms * Apply the logic and mathematics behind cryptographic attacks on asymmetric encryption * Discover emerging technologies like zero-knowledge protocols and homomorphic encryption * Understand fundamentals of lightweight encryption for IoT and discover a new algorithm in this field * Dive deep into quantum cryptography with the Shor and Grover algorithms Who this book is for: This book is for beginners who are IT professionals, students, cybersecurity enthusiasts, and anyone who wants to develop skills in modern cryptography and build a successful cybersecurity career. The book systematically addresses mathematical issues related to the algorithms that may arise. However, a prior knowledge of university-level mathematics, algebra, its main operators, modular mathematics, and finite fields theory is required. Some knowledge of elliptic curves and quantum computing, especially matrices and plotting curves would also be beneficial to get the most out of this book.



京公网安备 11010602104826号