語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Encryption for organizations and ind...
~
Ciesla, Robert.
Encryption for organizations and individualsbasics of contemporary and quantum cryptography /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Encryption for organizations and individualsby Robert Ciesla.
其他題名:
basics of contemporary and quantum cryptography /
作者:
Ciesla, Robert.
出版者:
Berkeley, CA :Apress :2020.
面頁冊數:
xxi, 286 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Data protection.
電子資源:
https://doi.org/10.1007/978-1-4842-6056-2
ISBN:
9781484260562$q(electronic bk.)
Encryption for organizations and individualsbasics of contemporary and quantum cryptography /
Ciesla, Robert.
Encryption for organizations and individuals
basics of contemporary and quantum cryptography /[electronic resource] :by Robert Ciesla. - Berkeley, CA :Apress :2020. - xxi, 286 p. :ill., digital ;24 cm.
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography.
Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. You will: Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD)
ISBN: 9781484260562$q(electronic bk.)
Standard No.: 10.1007/978-1-4842-6056-2doiSubjects--Topical Terms:
202312
Data protection.
LC Class. No.: QA76.9.A25 / C54 2020
Dewey Class. No.: 005.8
Encryption for organizations and individualsbasics of contemporary and quantum cryptography /
LDR
:03483nmm a2200325 a 4500
001
585542
003
DE-He213
005
20200818225010.0
006
m d
007
cr nn 008maaau
008
210311s2020 cau s 0 eng d
020
$a
9781484260562$q(electronic bk.)
020
$a
9781484260555$q(paper)
024
7
$a
10.1007/978-1-4842-6056-2
$2
doi
035
$a
978-1-4842-6056-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C54 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C569 2020
100
1
$a
Ciesla, Robert.
$3
789898
245
1 0
$a
Encryption for organizations and individuals
$h
[electronic resource] :
$b
basics of contemporary and quantum cryptography /
$c
by Robert Ciesla.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xxi, 286 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography.
520
$a
Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. You will: Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD)
650
0
$a
Data protection.
$3
202312
650
0
$a
Management information systems.
$3
199355
650
0
$a
Quantum computers.
$3
224163
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Enterprise Architecture.
$3
724747
650
2 4
$a
Quantum Computing.
$3
573152
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-6056-2
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000189478
電子館藏
1圖書
電子書
EB QA76.9.A25 C569 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-1-4842-6056-2
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入