Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Encryption for organizations and ind...
~
Ciesla, Robert.
Linked to FindBook
Google Book
Amazon
博客來
Encryption for organizations and individuals = basics of contemporary and quantum cryptography /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Encryption for organizations and individuals/ by Robert Ciesla.
Reminder of title:
basics of contemporary and quantum cryptography /
Author:
Ciesla, Robert.
Published:
Berkeley, CA :Apress : : 2020.,
Description:
xxi, 286 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography.
Contained By:
Springer Nature eBook
Subject:
Data protection. -
Online resource:
https://doi.org/10.1007/978-1-4842-6056-2
ISBN:
9781484260562
Encryption for organizations and individuals = basics of contemporary and quantum cryptography /
Ciesla, Robert.
Encryption for organizations and individuals
basics of contemporary and quantum cryptography /[electronic resource] :by Robert Ciesla. - Berkeley, CA :Apress :2020. - xxi, 286 p. :ill., digital ;24 cm.
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography.
Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. You will: Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD)
ISBN: 9781484260562
Standard No.: 10.1007/978-1-4842-6056-2doiSubjects--Topical Terms:
590548
Data protection.
LC Class. No.: QA76.9.A25 / C54 2020
Dewey Class. No.: 005.8
Encryption for organizations and individuals = basics of contemporary and quantum cryptography /
LDR
:03483nmm a2200325 a 4500
001
2256187
003
DE-He213
005
20200818225010.0
006
m d
007
cr nn 008maaau
008
220420s2020 cau s 0 eng d
020
$a
9781484260562
$q
(electronic bk.)
020
$a
9781484260555
$q
(paper)
024
7
$a
10.1007/978-1-4842-6056-2
$2
doi
035
$a
978-1-4842-6056-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C54 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C569 2020
100
1
$a
Ciesla, Robert.
$3
3251160
245
1 0
$a
Encryption for organizations and individuals
$h
[electronic resource] :
$b
basics of contemporary and quantum cryptography /
$c
by Robert Ciesla.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xxi, 286 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography.
520
$a
Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. You will: Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD)
650
0
$a
Data protection.
$3
590548
650
0
$a
Management information systems.
$3
528143
650
0
$a
Quantum computers.
$3
535318
650
1 4
$a
Security.
$3
3134865
650
2 4
$a
Enterprise Architecture.
$3
2153150
650
2 4
$a
Quantum Computing.
$3
1620399
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-6056-2
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9411823
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 C54 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login