The quantum threat is not a distant academic problem — it is a strategic reality that demands immediate, disciplined action. Managing Post‑Quantum Cryptography gives enterprise leaders the practical roadmap they need to move from awareness to execution: inventory every cryptographic dependency, prioritize what to migrate first, deploy hybrid and crypto‑agile architectures, and sustain a governance posture that endures across budget cycles and leadership changes.
This book is written for managers, CISOs, architects, and program leads who must translate technical standards into executable enterprise programs. It does not require a background in number theory. Instead, it explains the core technical concepts clearly and then focuses on the decisions that matter: which assets to inventory, how to assess vendor readiness, how to design hybrid key exchange and dual‑algorithm signatures, and how to build the organizational processes that keep a migration on track.
Inside you will find:
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
HRD. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L1-9781972752647
Quantité disponible : Plus de 20 disponibles
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Buch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware 270 pp. Englisch. N° de réf. du vendeur 9781972752647
Quantité disponible : 2 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Hardcover. Etat : Brand New. 273 pages. 6.24x0.81x9.24 inches. In Stock. N° de réf. du vendeur x-1972752642
Quantité disponible : 2 disponible(s)
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. N° de réf. du vendeur 26406539267
Quantité disponible : 4 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand. N° de réf. du vendeur 407696348
Quantité disponible : 4 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND. N° de réf. du vendeur 18406539273
Quantité disponible : 4 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Buch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -Every encrypted transaction your organization relies on today - every financial transfer, patient record, classified message, and identity verification - rests on mathematical assumptions that a sufficiently powerful quantum computer will break. As your manuscript warns, 'Every encrypted message your organization sent today rests on a mathematical problem that a sufficiently powerful quantum computer will solve.' The threat is no longer theoretical. The algorithms are published. The standards are finalized. Adversaries are already harvesting encrypted traffic to decrypt later.Managing Post¿Quantum Cryptography is the essential guide for leaders who must secure their enterprise before the machines catch up. Written for CISOs, IT executives, architects, and modernization leaders, this book explains the quantum threat in clear, accessible terms - without requiring a background in physics or number theory - and provides a complete roadmap for transitioning to quantum¿safe cryptography at enterprise scale.Readers will learn why classical encryption has an expiration date, how quantum algorithms break RSA and ECC, and why symmetric encryption survives but must be re¿evaluated. The book demystifies the new post¿quantum algorithm families, decodes the NIST selections, and explains what they mean for certificates, key exchange, authentication, and long¿horizon data protection.This guide equips leaders to:Identify which systems, protocols, and data categories are most at riskConduct a full cryptographic census across keys, certificates, algorithms, and dependenciesImplement hybrid cryptography to bridge classical and post¿quantum systemsBuild cryptöagility into enterprise architecture to avoid future forced migrationsPrioritize migration using risk¿tiered sequencing and dependency mappingGovern the transition across budget cycles, leadership changes, and vendor ecosystemsProtect long¿horizon data from 'harvest now, decrypt later' adversariesBuild a workforce and governance model capable of sustaining quantum resilienceThe book includes detailed playbooks, maturity models, migration templates, and decision frameworks that help leaders move from awareness to execution. It shows how to design hybrid deployments, evaluate vendor readiness, integrate new standards, and build monitoring systems that keep the enterprise secure long after the initial migration.Quantum computing will not wait for your organization to be ready. As the book emphasizes, 'The window for acting ahead of this threat is open now, but it is not indefinite.' This guide gives you the clarity, structure, and operational strategy to secure your enterprise before the machines catch up - and before your encrypted data becomes readable to anyone who has already captured it.If you are responsible for protecting sensitive data in a world racing toward quantum capability, this is the roadmap you cannot afford to postpone.Libri GmbH, Europaallee 1, 36244 Bad Hersfeld 270 pp. Englisch. N° de réf. du vendeur 9781972752647
Quantité disponible : 1 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Buch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering. N° de réf. du vendeur 9781972752647
Quantité disponible : 1 disponible(s)
Vendeur : preigu, Osnabrück, Allemagne
Buch. Etat : Neu. Managing Post-Quantum Cryptography | Claude Louis-Charles | Buch | Englisch | 2024 | Cybersoft Publishers | EAN 9781972752647 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu Print on Demand. N° de réf. du vendeur 135081613
Quantité disponible : 5 disponible(s)