<div class="product-section" style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <div class="description-body" style="text-align: left;margin-bottom: 21.0px;"> If you’re browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you’re relying on cryptography. And you’re probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It’s important to understand these tools so you can make the best decisions about how, where, and why to use them. <span> </span> <i style="">Real-World Cryptography <span> </span>teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. </div> </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <h2 style="color: inherit;text-transform: lowercase;line-height: 1.1;font-size: 27.0px;font-weight: 300;margin-top: 42.0px;margin-bottom: 10.5px;">about the technologyCryptography is the foundation of information security. This simultaneously ancient and emerging science is based on encryption and secure communication using algorithms that are hard to crack even for high-powered computer systems. Cryptography protects privacy, secures online activity, and defends confidential information, such as credit cards, from attackers and thieves. Without cryptographic techniques allowing for easy encrypting and decrypting of data, almost all IT infrastructure would be vulnerable. </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <h2 style="color: inherit;text-transform: lowercase;line-height: 1.1;font-size: 27.0px;font-weight: 300;margin-top: 42.0px;margin-bottom: 10.5px;">about the book <i style="">Real-World Cryptography <span> </span>helps you understand the cryptographic techniques at work in common tools, frameworks, and protocols so you can make excellent security choices for your systems and applications. There’s no unnecessary theory or jargon―just the most up-to-date techniques you’ll need in your day-to-day work as a developer or systems administrator. Cryptography expert <span> </span> <b style="font-weight: bold;">David Wong <span> </span>takes you hands-on with cryptography building blocks such as hash functions and key exchanges, then shows you how to use them as part of your security protocols and applications. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, password-authenticated key exchange, and post-quantum cryptography. Throughout, all techniques are fully illustrated with diagrams and real-world use cases so you can easily see how to put them into practice. </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <h2 style="color: inherit;text-transform: lowercase;line-height: 1.1;font-size: 27.0px;font-weight: 300;margin-top: 42.0px;margin-bottom: 10.5px;">what's inside <ul style="margin-top: 0.0px;margin-bottom: 10.5px;"> <li style="">Best practices for using cryptography <li style="">Diagrams and explanations of cryptographic algorithms <li style="">Identifying and fixing cryptography bad practices in applications <li style="">Picking the right cryptographic tool to solve problems </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <h2 style="color: inherit;text-transform: lowercase;line-height: 1.1;font-size: 27.0px;font-weight: 300;margin-top: 42.0px;margin-bottom: 10.5px;">about the readerFor cryptography beginners with no previous experience in the field. </div> <div style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"> <h2 style="color: inherit;text-transform: lowercase;line-height: 1.1;font-size: 27.0px;font-weight: 300;margin-top: 42.0px;margin-bottom: 10.5px;">about the author <b style="font-weight: bold;">David Wong <span> </span>is a senior engineer working on Blockchain at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community. David is a recognized authority in the field of applied cryptography; he’s spoken at large security conferences like Black Hat and DEF CON and has delivered cryptography training sessions in the industry. </div> </div>
"synopsis" may belong to another edition of this title.
<font color="#333333" face="Helvetica" size="4">David Wong</font> <span style="color: rgb(51,51,51);text-transform: none;text-indent: 0.0px;letter-spacing: normal;font-size: 17.25px;font-style: normal;font-weight: 300;word-spacing: 0.0px;float: none;display: inline;white-space: normal;orphans: 2;widows: 2;background-color: rgb(255,255,255);"><span> </span>is a senior engineer working on Blockchain at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community. David is a recognized authority in the field of applied cryptography; he’s spoken at large security conferences like Black Hat and DEF CON and has delivered cryptography training sessions in the industry.</span>
"About this title" may belong to another edition of this title.
£ 2.80 shipping within United Kingdom
Destination, rates & speedsSeller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR013671205
Quantity: 1 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New. Seller Inventory # 42559829-n
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # PB-9781617296710
Quantity: 15 available
Seller: Speedyhen, London, United Kingdom
Condition: NEW. Seller Inventory # NW9781617296710
Quantity: 1 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # PB-9781617296710
Quantity: 15 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9781617296710_new
Quantity: 1 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 42559829-n
Quantity: 1 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 42559829
Quantity: 1 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 388 pages. 9.25x7.37x0.50 inches. In Stock. Seller Inventory # __1617296716
Quantity: 1 available
Seller: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Ireland
Condition: New. 2021. 1st Edition. Paperback. . . . . . Seller Inventory # V9781617296710
Quantity: 1 available