gogogo
Syndetics cover image
Image from Syndetics

Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom.

Contributor(s): Material type: TextTextPublication details: New York : McGraw-Hill Education, 2015.Description: xix, 394 p. : illustrationsISBN:
  • 9781259588082
  • 1259588084
Subject(s): DDC classification:
  • 005.82 EAS
Summary: Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today\'s data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors. Learn the necessary number theory, discrete math, and algebra Employ symmetric ciphers, including Feistel and substitution-permutation ciphers Understand asymmetric cryptography algorithms Design s-boxes that maximize output non-linearity Deploy cryptographic hashes Create cryptographic keys using pseudo random number generators Encrypt Web traffic using SSL/TLS Secure VPN, WiFi, and SSH communications Work with cryptanalysis and steganography Explore government, military, and intelligence agency applications.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 005.82 EAS (Browse shelf(Opens below)) 1 Available 39002100626937

Enhanced descriptions from Syndetics:

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
A Practical Guide to Cryptography Principles and Security Practices

Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors.

Learn the necessary number theory, discrete math, and algebra Employ symmetric ciphers, including Feistel and substitution-permutation ciphers Understand asymmetric cryptography algorithms Design s-boxes that maximize output non-linearity Deploy cryptographic hashes Create cryptographic keys using pseudo random number generators Encrypt Web traffic using SSL/TLS Secure VPN, WiFi, and SSH communications Work with cryptanalysis and steganography Explore government, military, and intelligence agency applications

Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today\'s data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors. Learn the necessary number theory, discrete math, and algebra Employ symmetric ciphers, including Feistel and substitution-permutation ciphers Understand asymmetric cryptography algorithms Design s-boxes that maximize output non-linearity Deploy cryptographic hashes Create cryptographic keys using pseudo random number generators Encrypt Web traffic using SSL/TLS Secure VPN, WiFi, and SSH communications Work with cryptanalysis and steganography Explore government, military, and intelligence agency applications.

Author notes provided by Syndetics

Chuck Easttom has taught cryptography for federal agencies and friendly foreign governments and has worked on cryptography projects for Department of Defense contractors. He is the author of many security-focused books, including CCFP Certified Cyber Forensics Professional All-in-One Exam Guide .

Powered by Koha