Schedule Maintenance will occur today from 00:00 - 01:00. Easons.com may be unavailable during this period.

Modern cryptography

by Chuck Easttom | 16 October 2015
Synopsis
A Practical Guide to Cryptography Principles and Security Practices Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors. Learn the necessary number theory, discrete math, and algebra Employ symmetric ciphers, including Feistel and substitution-permutation ciphersUnderstand asymmetric cryptography algorithmsDesign s-boxes that maximize output non-linearityDeploy cryptographic hashesCreate cryptographic keys using pseudo random number generatorsEncrypt Web traffic using SSL/TLSSecure VPN, WiFi, and SSH communicationsWork with cryptanalysis and steganography Explore government, military, and intelligence agency applications
€67.19
201 Reward Points
In stock online
Delivery in 5-7 Days
Eligible for free delivery

Any purchases for more than €10 are eligible for free delivery anywhere in the UK or Ireland!

Synopsis
A Practical Guide to Cryptography Principles and Security Practices Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors. Learn the necessary number theory, discrete math, and algebra Employ symmetric ciphers, including Feistel and substitution-permutation ciphersUnderstand asymmetric cryptography algorithmsDesign s-boxes that maximize output non-linearityDeploy cryptographic hashesCreate cryptographic keys using pseudo random number generatorsEncrypt Web traffic using SSL/TLSSecure VPN, WiFi, and SSH communicationsWork with cryptanalysis and steganography Explore government, military, and intelligence agency applications
Quantity
Quantity
€67.19
201 Reward Points
In stock online
Delivery in 5-7 Days
Eligible for free delivery

Any purchases for more than €10 are eligible for free delivery anywhere in the UK or Ireland!

Quantity
Quantity

Product Details

ISBN - 9781259588082
Format -
Publisher -
Published - 16/10/2015
Categories - All, Books, Business Computers, Computers, Security, All, Books, Business Computers, Computers, General IT, All, Books, Business Computers, Computers, Computer Networking
No. of Pages - 0
Weight - 684.9
Edition -
Series - - Not Available
Page Size - 23
Language - en-US
Readership Age - Not Available
Table of Contents - Not Available

Delivery And Returns

Please Note: Items in our extended range may take longer to deliver. Delivery in 5-7 Days

Place an order for over €10 to receive free delivery to anywhere in Ireland and the UK! See our Delivery Charges section below for a full breakdown of shipping costs for all destinations.

 

Delivery Charges

  Ireland & UK* Europe & USA Australia & Canada Rest of World
Under €10 €3.80 €10 €15 €25
Over €10
Free €10 €15 €25

*Free delivery on all orders over €10 - only applies to order total.

All orders will be delivered by An Post.