Torrent details for "Dholakia S. Modern Cryptography. The Practical Guide 2024 [andryold1]"    Log in to bookmark

Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
12.34 MB
Info Hash:
e337aa3322d92d72fb70953b619cccc720e3bd64
Added By:
Added:  
20-12-2024 10:04
Views:
177
Health:
Seeds:
65
Leechers:
21
Completed:
208




Description
Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format

Security professionals, you know encryption is essential to protect your data. In this book, learn about the fundamental concepts of cryptography—and then apply them! Explore algorithms for symmetric and asymmetric cryptography and see how to use encryption strategies to enforce storage and network security. Put modern cryptography principles to work in real-world scenarios: cloud environments, cryptocurrency, artificial intelligence, quantum computing, and more. Build the cryptography skills you need to manage today’s security threats!
Use symmetric and asymmetric cryptography to protect your data
Work with hash functions, digital signatures, MAC, PKI, and encryption key management
Learn about homomorphic encryption, post-quantum encryption, cloud encryption, and other applications of modern cryptography
Cryptography Concepts
Master the theory behind cryptography. Walk through the principles, methods, and algorithms that are used to protect your data. Ensure data confidentiality, integrity, and authenticity using techniques such as hash functions, digital signatures, and MAC.
Practical Applications
Learn about modern cryptography in practice. From managing encryption keys in the cloud, to securing AI systems and machine learning models, to developing quantum-resistant cryptography algorithms, see how cryptography is used to protect data.
Expert Tips, Examples, and Best Practices
Unravel cryptography topics with guidance from an experienced security professional. Practical demonstrations, detailed formulas, and tips and tricks will help you navigate the complex world of data encryption.
Symmetric and asymmetric encryption
Artificial intelligence and IoT
Hash functions
Digital signatures
Message authentication codes (MAC)
Storage and network security
Encryption key management
Cloud cryptography
Lightweight cryptography
Cryptocurrencies
Quantum computing
Homomorphic encryption

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes