£ 1.99 shipping within U.S.A.
Destination, rates & speedsSeller: Lakeside Books, Benton Harbor, MI, U.S.A.
Condition: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books! Seller Inventory # OTF-S-9781493225651
Quantity: 2 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 48321123-n
Quantity: 6 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 48321123
Quantity: 6 available
Seller: Grand Eagle Retail, Fairfield, OH, U.S.A.
Paperback. Condition: new. Paperback. Security professionals, you know encryption is essential to protect your data. In this book, learn about the fundamental concepts of cryptography--and then apply them! Explore algorithms for symmetric and asymmetric cryptography and see how to use encryption strategies to enforce storage and network security. Put modern cryptography principles to work in real-world scenarios: cloud environments, cryptocurrency, artificial intelligence, quantum computing, and more. Build the cryptography skills you need to manage today's security threats! In this book, you'll learn about: a. Cryptography ConceptsMaster the theory behind cryptography. Walk through the principles, methods, and algorithms that are used to protect your data. Ensure data confidentiality, integrity, and authenticity using techniques such as hash functions, digital signatures, and MAC. b. Practical ApplicationsLearn about modern cryptography in practice. From managing encryption keys in the cloud, to securing AI systems and machine learning models, to developing quantum-resistant cryptography algorithms, see how cryptography is used to protect data. c. Expert Tips, Examples, and Best PracticesUnravel cryptography topics with guidance from an experienced security professional. Practical demonstrations, detailed formulas, and tips and tricks will help you navigate the complex world of data encryption. Highlights include: 1) Symmetric and asymmetric encryption2) Hash functions 3) Digital signatures4) Message authentication codes (MAC)5) Storage and network security 6) Encryption key management 7) Cloud cryptography8) Lightweight cryptography9) Cryptocurrencies10) Artificial intelligence and IoT 11) Quantum computing12) Homomorphic encryption13) Standards and best practices Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781493225651
Quantity: 1 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # IB-9781493225651
Quantity: 1 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # IB-9781493225651
Quantity: 1 available
Seller: Russell Books, Victoria, BC, Canada
paperback. Condition: New. New. Special order direct from the distributor. Seller Inventory # ING9781493225651
Quantity: 1 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. 526. Seller Inventory # B9781493225651
Quantity: 6 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 48321123-n
Quantity: 8 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 48321123
Quantity: 8 available