• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography

    Encryption for Organizations and Individuals by Ciesla, Robert;

    Basics of Contemporary and Quantum Cryptography

      • 20% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár EUR 69.54
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        28 841 Ft (27 468 Ft + 5% áfa)
      • Kedvezmény(ek) 20% (cc. 5 768 Ft off)
      • Kedvezményes ár 23 073 Ft (21 974 Ft + 5% áfa)

    28 841 Ft

    db

    Beszerezhetőség

    Megrendelésre a kiadó utánnyomja a könyvet. Rendelhető, de a szokásosnál kicsit lassabban érkezik meg.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    Hosszú leírás:

    Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them

    Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems.

    Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book.

    What You Will Learn

    • Appreciate how digital encryption algorithms work
    • Secure your infrastructure from cryptographic attacks
    • Understand the basics of quantum information science
    • Discover how cryptography relates to quantum computing
    • Implement Quantum Key Distribution (QKD)


    Who This Book Is For

    This book is aimed at readerswho have an interest in both well-established and up-and-coming types of cryptography, as well as members of organizations to whom privacy is a top priority.

    Több

    Tartalomjegyzék:

    Chapter 1: The First Era of Digital Encryption.- Chapter 2: A Medium-Length History of Digital Cryptography.- Chapter 3: The AES and Other Established Cryptographic Technologies.- Chapter 4: You, Your Organization, and Cryptographic Security.- Chapter 5: Common Attacks Against Cryptographic Systems.- Chapter 6: Creating Extremely Secure Encrypted Systems.- Chapter 7: Prohibitions and Legal Issues.- Chapter 8: Quantum Computing: The Next Big Paradigm.- Chapter 9: The Rollicking World of Quantum Mechanics.- Chapter 10: Quantum Information Science 101.- Chapter 11: Quantum Cryptography.- Chapter 12: Quantum Key Distribution Under Attack.- Chapter 13: Implementations of QKD.- Chapter 14: Post-Quantum Cryptography.-

    Több