Boditein nakupujte z BREZPLAČNO dostavo SEDAJ TUDI NA DOM!
0
na mesec

Serious Cryptography

Serious Cryptography

Številka: 18287021
Partnerska prodaja
Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is fille .. Celoten opis
46,70 €
Partner: LIBRISTO
Zagotovite si brezplačno dostavo s

Partnerska zaloga 5 artikli

16.7.2024 predviden osebni prevzem
 
16.7.2024 - 18.7.2024 predvidena dostava na dom
 

Artikli partnerja LIBRISTO

Za prodajo odgovarja mimovrste=), vključno z morebitnimi reklamacijami ali vračili artiklov.
Partner pošlje artikle v ločeni pošiljki.
Način in ceno dostave določi partner. Osebni prevzem partnerskih artiklov v mimovrste=) trgovinah ni mogoč.
Številka: 18287021

Predstavitev

Ta knjiga je v tujem jeziku: Angleščina


Lastnosti knjige
  • Jezik: Angleščina
  • Založnik: No Starch Press,US
  • Vezava: Knjiga – Brošura
  • Število strani: 304

Originalni opis knjige
Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work.Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and post-quantum cryptography. Numerous code examples and real use cases throughout will help practitioners to understand the core concepts behind modern cryptography, as well as how to choose the best algorithm or protocol and ask the right questions of vendors.Aumasson discusses core concepts like computational security and forward secrecy, as well as strengths and limitations of cryptographic functionalities related to authentication, integrity, or random number generation. Readers also learn how to avoid common mistakes with implementations, thanks to a section in every chapter that discuss what could go wrong, including horror stories and examples of failures in real applications.