Categories

Categories

Additional Information

Additional Information
  • Home

Account Navigation

Account Navigation

Currency - All prices are in AUD

Currency - All prices are in AUD
 Loading... Please wait...
  • Call us on (US) 1.877.772.2536 or (AU) 07 32052596
  • My Account
The Art of Service

Categories

Categories

Encryption: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Encryption: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

$39.95

Product Description

This book explains in-depth the real drivers and workings of Encryption. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Encryption with the objectivity of experienced professionals.
Encryption is used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks.

Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication code (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem

This book is your ultimate resource for Encryption. Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Encryption right away, covering: Encryption, Cryptography, Outline of cryptography, 1dl, Anonymous veto network, Array controller based encryption, Authenticated encryption, Authorization certificate, Autokey cypher, Avalanche effect, Averaging argument, Backdoor (computing), Bent function, Bigram, BLACKER, Blind credential, Blind signature, Blinding (cryptography), Block design, Block size (cryptography), Blom's scheme, BLS (cryptography), Blum-Micali algorithm, Boneh/Franklin scheme, Boolean function, Brown fox code, Burrows–Abadi–Needham logic, Bus encryption, Byzantine fault tolerance, Cardan grille, Chaocipher, Cipher, Cipher runes, User talk:Ciphergoth/One-time pad, Ciphertext, Ciphertext expansion, Ciphertext indistinguishability, Civision, Client-Side Encryption, Clipper chip, Cocks IBE scheme, Code (cryptography), Code word, Codebook, Codress message, Collision resistance, Commitment scheme, Communications security, Comparison of cryptographic hash functions, Completeness (cryptography), Compromise, Computer insecurity, Concrete security, Confusion and diffusion, Conjugate coding, Correlation attack, Correlation immunity, Cover (telecommunications), Cover-coding, Critical Security Parameter, Crypto-politics, Cryptochannel, Cryptographic engineering, Cryptographic hash function, Cryptographic nonce, Cryptographic Service Provider, Cryptographic Test Correction, Portal:Cryptography, CrypTool, Cryptosystem, Cryptovirology, Decipherment, Deniable encryption, Designated verifier signature, Deterministic encryption, Digital credential, Digital signature, Digital signature forgery, Dining cryptographers problem, Diplomatic bag, Direct Anonymous Attestation, Discrete logarithm, EFF DES cracker, Electronic signature, Elliptic curve cryptography, Encrypted function, End-to-end encryption, Enigma machine, Entropic security, Ephemeral key, Factorization of polynomials over a finite field and irreducibility tests, Feedback with Carry Shift Registers, File camouflage, Floradora, Forking lemma, Forward anonymity, Friend-to-friend, Generic group model, Group key, Group signature, Group-based cryptography, HashClash, Homomorphic encryption, Horton Principle, Hybrid cryptosystem, Hyper-encryption, ID-based cryptography, ID-based encryption, Ideal lattice cryptography, Index of coincidence, Information leakage, Initialization vector, Kerckhoffs's Principle, Key (cryptography), Key Ceremony, Key number method, Keyring (cryptography), Kish cypher, Kiss (cryptanalysis), Kleptography, Knapsack problem, KY-7, Lamport signature, Lattice-based cryptography, Lattice problem, Learning with errors... and much more.

This book explains in-depth the real drivers and workings of Encryption. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Encryption with the objectivity of experienced professionals.

Product Reviews

Find Similar Products by Category