<div class="product-section" style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <div class="description-body" style="text-align: left;margin-bottom: 21.0px;"> If you’re browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you’re relying on cryptography. And you’re probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It’s important to understand these tools so you can make the best decisions about how, where, and why to use them. <span> </span> <i style="">Real-World Cryptography <span> </span>teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. </div> </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <h2 style="color: inherit;text-transform: lowercase;line-height: 1.1;font-size: 27.0px;font-weight: 300;margin-top: 42.0px;margin-bottom: 10.5px;">about the technologyCryptography is the foundation of information security. This simultaneously ancient and emerging science is based on encryption and secure communication using algorithms that are hard to crack even for high-powered computer systems. Cryptography protects privacy, secures online activity, and defends confidential information, such as credit cards, from attackers and thieves. Without cryptographic techniques allowing for easy encrypting and decrypting of data, almost all IT infrastructure would be vulnerable. </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <h2 style="color: inherit;text-transform: lowercase;line-height: 1.1;font-size: 27.0px;font-weight: 300;margin-top: 42.0px;margin-bottom: 10.5px;">about the book <i style="">Real-World Cryptography <span> </span>helps you understand the cryptographic techniques at work in common tools, frameworks, and protocols so you can make excellent security choices for your systems and applications. There’s no unnecessary theory or jargon―just the most up-to-date techniques you’ll need in your day-to-day work as a developer or systems administrator. Cryptography expert <span> </span> <b style="font-weight: bold;">David Wong <span> </span>takes you hands-on with cryptography building blocks such as hash functions and key exchanges, then shows you how to use them as part of your security protocols and applications. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, password-authenticated key exchange, and post-quantum cryptography. Throughout, all techniques are fully illustrated with diagrams and real-world use cases so you can easily see how to put them into practice. </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <h2 style="color: inherit;text-transform: lowercase;line-height: 1.1;font-size: 27.0px;font-weight: 300;margin-top: 42.0px;margin-bottom: 10.5px;">what's inside <ul style="margin-top: 0.0px;margin-bottom: 10.5px;"> <li style="">Best practices for using cryptography <li style="">Diagrams and explanations of cryptographic algorithms <li style="">Identifying and fixing cryptography bad practices in applications <li style="">Picking the right cryptographic tool to solve problems </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <h2 style="color: inherit;text-transform: lowercase;line-height: 1.1;font-size: 27.0px;font-weight: 300;margin-top: 42.0px;margin-bottom: 10.5px;">about the readerFor cryptography beginners with no previous experience in the field. </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <h2 style="color: inherit;text-transform: lowercase;line-height: 1.1;font-size: 27.0px;font-weight: 300;margin-top: 42.0px;margin-bottom: 10.5px;">about the author <b style="font-weight: bold;">David Wong <span> </span>is a senior engineer working on Blockchain at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community. David is a recognized authority in the field of applied cryptography; he’s spoken at large security conferences like Black Hat and DEF CON and has delivered cryptography training sessions in the industry. </div> </div>
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
<font color="#333333" face="Helvetica" size="4">David Wong</font> <span style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;float: none;display: inline;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"><span> </span>is a senior engineer working on Blockchain at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community. David is a recognized authority in the field of applied cryptography; he’s spoken at large security conferences like Black Hat and DEF CON and has delivered cryptography training sessions in the industry.</span>
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 5,84 expédition depuis Royaume-Uni vers France
Destinations, frais et délaisEUR 0,16 expédition depuis Etats-Unis vers France
Destinations, frais et délaisVendeur : WorldofBooks, Goring-By-Sea, WS, Royaume-Uni
Paperback. Etat : Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. N° de réf. du vendeur GOR013671205
Quantité disponible : 1 disponible(s)
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
PAP. Etat : New. New Book. Shipped from UK. Established seller since 2000. N° de réf. du vendeur PB-9781617296710
Quantité disponible : 15 disponible(s)
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
PAP. Etat : New. New Book. Shipped from UK. Established seller since 2000. N° de réf. du vendeur PB-9781617296710
Quantité disponible : 15 disponible(s)
Vendeur : Speedyhen, London, Royaume-Uni
Etat : NEW. N° de réf. du vendeur NW9781617296710
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 42559829-n
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 42559829
Quantité disponible : 1 disponible(s)
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9781617296710_new
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 42559829-n
Quantité disponible : Plus de 20 disponibles
Vendeur : moluna, Greven, Allemagne
Etat : New. Über den AutorDavid Wong is a senior engineer working on Blockchain at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community. David is a recogniz. N° de réf. du vendeur 398289624
Quantité disponible : 1 disponible(s)
Vendeur : Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlande
Etat : New. 2021. 1st Edition. Paperback. . . . . . N° de réf. du vendeur V9781617296710
Quantité disponible : 1 disponible(s)