
- 425 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Security professionals, you know encryption is essential to protect your data. In this book, learn about the fundamental concepts of cryptography—and then apply them! Explore algorithms for symmetric and asymmetric cryptography and see how to use encryption strategies to enforce storage and network security. Put modern cryptography principles to work in real-world scenarios: cloud environments, cryptocurrency, artificial intelligence, quantum computing, and more. Build the cryptography skills you need to manage today's security threats! In this book, you'll learn about: a. Cryptography Concepts
Master the theory behind cryptography. Walk through the principles, methods, and algorithms that are used to protect your data. Ensure data confidentiality, integrity, and authenticity using techniques such as hash functions, digital signatures, and MAC. b. Practical Applications
Learn about modern cryptography in practice. From managing encryption keys in the cloud, to securing AI systems and machine learning models, to developing quantum-resistant cryptography algorithms, see how cryptography is used to protect data. c. Expert Tips, Examples, and Best Practices
Unravel cryptography topics with guidance from an experienced security professional. Practical demonstrations, detailed formulas, and tips and tricks will help you navigate the complex world of data encryption. Highlights include:
1) Symmetric and asymmetric encryption
2) Hash functions
3) Digital signatures
4) Message authentication codes (MAC)
5) Storage and network security
6) Encryption key management
7) Cloud cryptography
8) Lightweight cryptography
9) Cryptocurrencies
10) Artificial intelligence and IoT
11) Quantum computing
12) Homomorphic encryption
13) Standards and best practices
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Notes on Usage
- Table of Contents
- Â Foreword
- Â Acknowledgments
- Â Preface
- Part I Â Foundations of Modern Cryptography
- 1 Â Fundamentals of Cryptography
- 2 Â Symmetric Cryptography
- 3 Â Asymmetric Cryptography
- 4 Â Cryptography Services
- Part II Â Modern Cryptography in Practice
- 5 Â Storage Security: Data Encryption at Rest
- 6 Â Web Security: Data Encryption in Transit
- 7 Â Cloud and Connected Device Cryptography
- 8 Â Cryptography in Cryptocurrency
- 9 Â Cryptography and Artificial Intelligence
- 10 Â Post-Quantum Cryptography
- 11 Â Homomorphic Encryption
- 12 Â Cryptography Attacks and Ransomware
- 13 Â Cryptography Standards and Resources
- 14 Â Future Trends and Concluding Remarks
- A Â Bibliography
- B Â The Author
- Index
- Service Pages
- Legal Notes