語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Encryption for organizations and ind...
~
Ciesla, Robert.
FindBook
Google Book
Amazon
博客來
Encryption for organizations and individuals = basics of contemporary and quantum cryptography /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Encryption for organizations and individuals/ by Robert Ciesla.
其他題名:
basics of contemporary and quantum cryptography /
作者:
Ciesla, Robert.
出版者:
Berkeley, CA :Apress : : 2020.,
面頁冊數:
xxi, 286 p. :ill., digital ;24 cm.
內容註:
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography.
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-1-4842-6056-2
ISBN:
9781484260562
Encryption for organizations and individuals = basics of contemporary and quantum cryptography /
Ciesla, Robert.
Encryption for organizations and individuals
basics of contemporary and quantum cryptography /[electronic resource] :by Robert Ciesla. - Berkeley, CA :Apress :2020. - xxi, 286 p. :ill., digital ;24 cm.
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography.
Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. You will: Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD)
ISBN: 9781484260562
Standard No.: 10.1007/978-1-4842-6056-2doiSubjects--Topical Terms:
590548
Data protection.
LC Class. No.: QA76.9.A25 / C54 2020
Dewey Class. No.: 005.8
Encryption for organizations and individuals = basics of contemporary and quantum cryptography /
LDR
:03483nmm a2200325 a 4500
001
2256187
003
DE-He213
005
20200818225010.0
006
m d
007
cr nn 008maaau
008
220420s2020 cau s 0 eng d
020
$a
9781484260562
$q
(electronic bk.)
020
$a
9781484260555
$q
(paper)
024
7
$a
10.1007/978-1-4842-6056-2
$2
doi
035
$a
978-1-4842-6056-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C54 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C569 2020
100
1
$a
Ciesla, Robert.
$3
3251160
245
1 0
$a
Encryption for organizations and individuals
$h
[electronic resource] :
$b
basics of contemporary and quantum cryptography /
$c
by Robert Ciesla.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xxi, 286 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography.
520
$a
Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. You will: Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD)
650
0
$a
Data protection.
$3
590548
650
0
$a
Management information systems.
$3
528143
650
0
$a
Quantum computers.
$3
535318
650
1 4
$a
Security.
$3
3134865
650
2 4
$a
Enterprise Architecture.
$3
2153150
650
2 4
$a
Quantum Computing.
$3
1620399
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-6056-2
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9411823
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 C54 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入