Modern Cryptography: Applied Mathematics for Encryption and Information Security (eBook)

Modern Cryptography: Applied Mathematics for Encryption and Information Security
By:Easttom, Chuck
Pub Date:October 9th 2015
Format:Electronic Book 608 pages
Other Formats: View Print Details
ISBN:1259588092 / 9781259588099
Your Price:$60.00 ADD TO CART
More Information




Main description

This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels--with no math expertise required

Cryptography underpins today's cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods.

The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture--full explanations of real-world applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise--the reader will be exposed to only the formulas and equations needed to master the art of cryptography.

  • Concisely explains complex formulas and equations and makes the math easy
  • Teaches even the information security novice critical encryption skills
  • Written by a globally-recognized security expert who has taught cryptography to various government and civilian groups and organizations around the world


Table of contents

Section I: Foundations
Chapter 1: History of Cryptography to the 1800's
Chapter 2: History of Cryptography from the 1800's
Chapter 3: Basic Information Theory
Chapter 4: Essential Number Theory and Discrete Math
Chapter 5: Essential Algebra

Section II: Symmetric Ciphers and Hashes
Chapter 6: Feistel Networks
Chapter 7: Substitution-Permutation Networks
Chapter 8: S-Box Design
Chapter 9: Cryptographic Hashes

Section III: Asymmetric Ciphers
Chapter 10: Common Algorithms
Chapter 11: ECC

Section IV: Applications
Chapter 12: Random Number Generators
Chapter 13: SSL/TLS
Chapter 14: VPNs
Chapter 15: Military Applications
Chapter 16: Steganography
Chapter 17: Cryptanalysis
Chapter 18: Cryptographic Backdoors


Backcover

Author Information


Chuck Easttom is an internationally acclaimed computer scientist and security expert. He is president and chief consultant for CEC-Security, which specializes in IT training and litigation consulting.

Downloads & Resources

Downloads



Related Products

Owl Image

Date: Oct 22nd, 2017
Your Price: $55.00
Owl Image

Date: Jul 7th, 2017
Your Price: $45.00
Owl Image

Date: Jun 24th, 2017
Your Price: $120.00
Owl Image

Date: Jun 23rd, 2017
Your Price: $40.00
Owl Image

Date: Jun 2nd, 2017
Your Price: $16.00
Owl Image

Date: May 22nd, 2017
Your Price: $150.00
Owl Image

Date: May 5th, 2017
Your Price: $22.00
Owl Image

Date: Apr 22nd, 2017
Your Price: $49.00
Owl Image

Date: Apr 7th, 2017
Your Price: $60.00
Owl Image

Date: Mar 22nd, 2017
Your Price: $285.00
Owl Image

Date: Mar 22nd, 2017
Your Price: $40.00
Owl Image

Date: Mar 22nd, 2017
Your Price: $39.00
Owl Image

Date: Mar 8th, 2017
Your Price: $60.00
Owl Image

Date: Feb 22nd, 2017
Your Price: $49.00
Owl Image

Date: Feb 6th, 2017
Your Price: $150.00