語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Encryption for Organizations and Ind...
~
SpringerLink (Online service)
Encryption for Organizations and Individuals = Basics of Contemporary and Quantum Cryptography /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Encryption for Organizations and Individuals/ by Robert Ciesla.
其他題名:
Basics of Contemporary and Quantum Cryptography /
作者:
Ciesla, Robert.
面頁冊數:
XXI, 286 p. 44 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Quantum Computing. -
電子資源:
https://doi.org/10.1007/978-1-4842-6056-2
ISBN:
9781484260562
Encryption for Organizations and Individuals = Basics of Contemporary and Quantum Cryptography /
Ciesla, Robert.
Encryption for Organizations and Individuals
Basics of Contemporary and Quantum Cryptography /[electronic resource] :by Robert Ciesla. - 1st ed. 2020. - XXI, 286 p. 44 illus.online resource.
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography -- .
Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. You will: Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD).
ISBN: 9781484260562
Standard No.: 10.1007/978-1-4842-6056-2doiSubjects--Topical Terms:
883739
Quantum Computing.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Encryption for Organizations and Individuals = Basics of Contemporary and Quantum Cryptography /
LDR
:03779nam a22003855i 4500
001
1022740
003
DE-He213
005
20200818225010.0
007
cr nn 008mamaa
008
210318s2020 xxu| s |||| 0|eng d
020
$a
9781484260562
$9
978-1-4842-6056-2
024
7
$a
10.1007/978-1-4842-6056-2
$2
doi
035
$a
978-1-4842-6056-2
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Ciesla, Robert.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1199397
245
1 0
$a
Encryption for Organizations and Individuals
$h
[electronic resource] :
$b
Basics of Contemporary and Quantum Cryptography /
$c
by Robert Ciesla.
250
$a
1st ed. 2020.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
XXI, 286 p. 44 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1: The First Era of Digital Encryption -- Chapter 2: A Medium-Length History of Digital Cryptography -- Chapter 3: The AES and Other Established Cryptographic Technologies -- Chapter 4: You, Your Organization, and Cryptographic Security -- Chapter 5: Common Attacks Against Cryptographic Systems -- Chapter 6: Creating Extremely Secure Encrypted Systems -- Chapter 7: Prohibitions and Legal Issues -- Chapter 8: Quantum Computing: The Next Big Paradigm -- Chapter 9: The Rollicking World of Quantum Mechanics -- Chapter 10: Quantum Information Science 101 -- Chapter 11: Quantum Cryptography -- Chapter 12: Quantum Key Distribution Under Attack -- Chapter 13: Implementations of QKD -- Chapter 14: Post-Quantum Cryptography -- .
520
$a
Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. You will: Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD).
650
2 4
$a
Quantum Computing.
$3
883739
650
2 4
$a
Enterprise Architecture.
$3
1067035
650
1 4
$a
Security.
$3
1114130
650
0
$a
Quantum computers.
$3
564139
650
0
$a
Management information systems.
$3
561123
650
0
$a
Data protection.
$3
557764
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484260555
776
0 8
$i
Printed edition:
$z
9781484260579
856
4 0
$u
https://doi.org/10.1007/978-1-4842-6056-2
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入