Managing Post-Quantum Cryptography
Securing the Enterprise Before the Machines Catch Up
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
Obtén 30 días de Standard gratis
$8.99 al mes después de que termine la prueba. Cancela en cualquier momento
Compra ahora por $9.99
-
Narrado por:
-
Virtual Voice
Este título utiliza narración de voz virtual
Voz Virtual es una narración generada por computadora para audiolibros..
This book is written for managers, CISOs, architects, and program leads who must translate technical standards into executable enterprise programs. It does not require a background in number theory. Instead, it explains the core technical concepts clearly and then focuses on the decisions that matter: which assets to inventory, how to assess vendor readiness, how to design hybrid key exchange and dual‑algorithm signatures, and how to build the organizational processes that keep a migration on track.
Inside you will find:
- A concise technical primer that explains why asymmetric cryptography is uniquely vulnerable to quantum algorithms, how symmetric ciphers are affected, and what “harvest now, decrypt later” means for long‑horizon data.
- A practical treatment of post‑quantum algorithm families — lattice‑based, hash‑based, code‑based, multivariate — and a framework for aligning algorithm choices to use cases.
- Standards and compliance guidance that decodes NIST selections, federal guidance, and industry expectations so you can extract the enterprise actions that matter.
- The cryptographic census: a step‑by‑step methodology to discover keys, certificates, and protocol dependencies across complex environments.
- Hybrid deployment patterns that let classical and post‑quantum algorithms operate in parallel while you migrate, with protocol‑specific guidance for TLS, VPNs, PKI, and HSMs.
- Crypto‑agility architecture: design principles, API patterns, and PKI practices that make future algorithm transitions routine rather than crisis‑driven.
- A migration playbook with sequencing, risk‑tiered prioritization, testing and rollback plans, and procurement strategies to hold vendors accountable.
- Governance and workforce strategies to institutionalize post‑quantum resilience: audit readiness, evidence collection, training, and continuous threat monitoring.
- Operational artifacts you can use immediately: model checklists, risk register templates, incident postmortem forms, and a 90‑day implementation roadmap.
The window to act is open but finite. Adversaries are already archiving encrypted traffic with the intent to decrypt it later; organizations that delay will face a migration under crisis conditions rather than a planned transition. This book equips you to lead that transition methodically: to protect long‑horizon data, to prioritize resources where they matter most, and to build an enterprise posture that outlasts any single algorithm.
If you are responsible for protecting confidentiality, integrity, or authentication across an enterprise, this is the practical guide you need to move from risk awareness to operational resilience — before the machines catch up.
Todavía no hay opiniones