Applied Cryptography
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
Prueba gratis de 30 días de Audible Standard
Selecciona 1 audiolibro al mes de nuestra colección completa de más de 1 millón de títulos.
Es tuyo mientras seas miembro.
Obtén acceso ilimitado a los podcasts con mayor demanda.
Plan Standard se renueva automáticamente por $8.99 al mes después de 30 días. Cancela en cualquier momento.
Compra ahora por $9.50
-
Narrado por:
-
Virtual Voice
-
De:
-
Ajit Singh
Este título utiliza narración de voz virtual
Voz Virtual es una narración generada por computadora para audiolibros..
Philosophy: From Theory to Action
The core philosophy of this book is "learning by building." Traditional cryptography texts often prioritize complex mathematical proofs and theoretical constructs, which, while important, can create a barrier for those whose primary goal is to write secure code. This book inverts that approach. I start with a practical problem—like the need to send a secret message—and then introduce the cryptographic concept and algorithm that solves it. Every theoretical explanation is immediately followed by a step-by-step implementation guide, allowing readers to see the principles in action and build a tangible understanding. The guiding principle is that one cannot truly grasp cryptography without implementing it.
Key Features: What Makes This Book Different
1. Application-Oriented: The primary focus is on how to use cryptography, not just how it works.
2. Step-by-Step Implementations: Clear, numbered algorithms and corresponding code for every major concept.
3. Practical Examples & Case Studies: Each chapter includes real-life examples (e.g., securing web traffic, encrypting emails, blockchain hashing) to illustrate the concepts.
4. Complete Capstone Project: A full, working DIY project with source code to build a secure file transfer application, demonstrating the integration of multiple cryptographic techniques.
5. Modern & Updated Content: Covers modern standards like AES, RSA, ECC, SHA-3, and protocols like TLS 1.3, providing relevant skills for today's technology landscape.
6. Visual Aids: Includes diagrams and architectural illustrations to explain complex systems like PKI, the TLS handshake, and cryptographic modes of operation.
7. Clear and Accessible Language: Complex topics are broken down into simple, easy-to-understand explanations, making the book suitable for beginners and a useful reference for advanced learners.
Key Takeaways: Skills You Will Acquire
After completing this book, the reader will be able to:
1. Understand the core objectives of cryptography: Confidentiality, integrity, authentication, and non-repudiation.
2. Select the appropriate cryptographic algorithm for a given security task.
3. Implement symmetric and asymmetric encryption to protect data in transit and at rest.
4. Use cryptographic hash functions to verify data integrity.
5. Create and verify digital signatures to ensure authenticity and non-repudiation.
6. Understand and implement a secure key exchange protocol like Diffie-Hellman.
7. Grasp the architecture and components of a Public Key Infrastructure (PKI).
8. Analyze the security of real-world protocols like TLS/SSL.
9. Build a complete, secure application from scratch by integrating various cryptographic primitives.
Disclaimer: Earnest request from the Author.
Kindly go through the table of contents and refer kindle edition for a glance on the related contents.
Thank you for your kind consideration!
Todavía no hay opiniones