My Account Details

ISBN10: 1259588092 | ISBN13: 9781259588099

Step 1 . Download Adobe Digital Editions to your PC or Mac desktop/laptop.
Step 2. Register and authorize your Adobe ID (optional). To access your eBook on multiple devices, first create an Adobe ID at account.adobe.com. Then, open Adobe Digital Editions, go to the Help menu, and select "Authorize Computer" to link your Adobe ID.
Step 3. Open Your eBook. Use Adobe Digital Editions to open the file. If the eBook doesn’t open, contact customer service for assistance.
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required Cryptography underpins today’s cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods. The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture—full explanations of real-world applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise—the reader will be exposed to only the formulas and equations needed to master the art of cryptography. Concisely explains complex formulas and equations and makes the math easy Teaches even the information security novice critical encryption skills Written by a globally-recognized security expert who has taught cryptography to various government and civilian groups and organizations around the world
Chapter 1: History of Cryptography to the 1800's
Chapter 2: History of Cryptography from the 1800's
Chapter 3: Basic Information Theory
Chapter 4: Essential Number Theory and Discrete Math
Chapter 5: Essential Algebra
Section II: Symmetric Ciphers and Hashes
Chapter 6: Feistel Networks
Chapter 7: Substitution-Permutation Networks
Chapter 8: S-Box Design
Chapter 9: Cryptographic Hashes
Section III: Asymmetric Ciphers
Chapter 10: Common Algorithms
Chapter 11: ECC
Section IV: Applications
Chapter 12: Random Number Generators
Chapter 13: SSL/TLS
Chapter 14: VPNs
Chapter 15: Military Applications
Chapter 16: Steganography
Chapter 17: Cryptanalysis
Chapter 18: Cryptographic Backdoors
Need support? We're here to help - Get real-world support and resources every step of the way.