Modern cryptography : applied mathematics for encryption and information security /

This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels, with no mathematical expertise required.

Saved in:
Bibliographic Details
Main Author: Easttom, Chuck (Author)
Format: Electronic eBook
Language:English
Published: New York : McGraw-Hill Education, [2016]
Series:Online access with DDA: Askews (Maths)
Subjects:
Online Access:CONNECT

MARC

LEADER 00000cam a2200000Ii 4500
001 in00006063367
006 m o d
007 cr unu||||||||
008 160113s2016 nyua ob 001 0 eng d
005 20220713134309.8
035 |a 1WRLDSHRocn934650284 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCA  |d OCLCF  |d TOH  |d UKAHL  |d LVT  |d JTB  |d OCLCO 
019 |a 1076765927 
020 |z 9781259588082 
020 |a 9781259588099 
020 |a 1259588092 
020 |a 1259588084 
020 |a 9781259588082 
035 |a (OCoLC)934650284  |z (OCoLC)1076765927 
037 |a CL0500000701  |b Safari Books Online 
050 4 |a TK5102.94 
082 0 4 |a 005.82  |2 23 
049 |a TXMM 
100 1 |a Easttom, Chuck,  |e author. 
245 1 0 |a Modern cryptography :  |b applied mathematics for encryption and information security /  |c Chuck Easttom. 
246 3 0 |a Applied mathematics for encryption and information security 
264 1 |a New York :  |b McGraw-Hill Education,  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on print version record. 
504 |a Includes bibliographical references and index. 
520 8 |a This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels, with no mathematical expertise required.  |b A Practical Guide to Cryptography Principles and Security Practices Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors. Learn the necessary number theory, discrete math, and algebra Employ symmetric ciphers, including Feistel and substitution-permutation ciphersUnderstand asymmetric cryptography algorithmsDesign s-boxes that maximize output non-linearityDeploy cryptographic hashesCreate cryptographic keys using pseudo random number generatorsEncrypt Web traffic using SSL/TLSSecure VPN, WiFi, and SSH communicationsWork with cryptanalysis and steganography Explore government, military, and intelligence agency applications. 
590 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
650 0 |a Data encryption (Computer science) 
650 0 |a Information networks  |x Security measures  |x Mathematics. 
650 0 |a Computer networks  |x Security measures  |x Mathematics. 
650 0 |a Computer security  |x Mathematics. 
730 0 |a WORLDSHARE SUB RECORDS 
776 0 8 |i Print version:  |a Easttom, Chuck.  |t Modern cryptography.  |d New York : McGraw-Hill Education, [2016]  |z 9781259588082  |w (DLC) 2015033200  |w (OCoLC)923665686 
830 0 |a Online access with DDA: Askews (Maths) 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781259588099/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 5a7c11ca-81bd-429c-a1d9-9928637f0a71  |i 5338ce42-6798-4527-9303-159819434a24  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e TK5102.94   |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781259588099/?ar  |z CONNECT