Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Encryption for organizations and ind...
~
Ciesla, Robert.
Encryption for organizations and individualsbasics of contemporary and quantum cryptography /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Encryption for organizations and individualsby Robert Ciesla.
Reminder of title:
basics of contemporary and quantum cryptography /
Author:
Ciesla, Robert.
Published:
Berkeley, CA :Apress :2020.
Description:
xxi, 286 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Data protection.
Online resource:
https://doi.org/10.1007/978-1-4842-6056-2
ISBN:
9781484260562$q(electronic bk.)
Encryption for organizations and individualsbasics of contemporary and quantum cryptography /
Ciesla, Robert.
Encryption for organizations and individuals
basics of contemporary and quantum cryptography /[electronic resource] :by Robert Ciesla. - Berkeley, CA :Apress :2020. - xxi, 286 p. :ill., digital ;24 cm.
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography.
Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. You will: Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD)
ISBN: 9781484260562$q(electronic bk.)
Standard No.: 10.1007/978-1-4842-6056-2doiSubjects--Topical Terms:
202312
Data protection.
LC Class. No.: QA76.9.A25 / C54 2020
Dewey Class. No.: 005.8
Encryption for organizations and individualsbasics of contemporary and quantum cryptography /
LDR
:03483nmm a2200325 a 4500
001
585542
003
DE-He213
005
20200818225010.0
006
m d
007
cr nn 008maaau
008
210311s2020 cau s 0 eng d
020
$a
9781484260562$q(electronic bk.)
020
$a
9781484260555$q(paper)
024
7
$a
10.1007/978-1-4842-6056-2
$2
doi
035
$a
978-1-4842-6056-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C54 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C569 2020
100
1
$a
Ciesla, Robert.
$3
789898
245
1 0
$a
Encryption for organizations and individuals
$h
[electronic resource] :
$b
basics of contemporary and quantum cryptography /
$c
by Robert Ciesla.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xxi, 286 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography.
520
$a
Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. You will: Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD)
650
0
$a
Data protection.
$3
202312
650
0
$a
Management information systems.
$3
199355
650
0
$a
Quantum computers.
$3
224163
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Enterprise Architecture.
$3
724747
650
2 4
$a
Quantum Computing.
$3
573152
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-6056-2
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000189478
電子館藏
1圖書
電子書
EB QA76.9.A25 C569 2020 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-1-4842-6056-2
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login