Your all-in-one guide to cryptography, from theory to practice!

Modern Cryptography The Practical Guide

written by
$54.99

Available

$59.95

Available

$69.99

Available

Print edition E-book Bundle
425 pages, , Print edition paperback
ISBN 978-1-4932-2565-1
425 pages,
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2566-8
425 pages, , Print edition paperback
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2567-5
Security professionals, you know encryption is essential to protect your data. In this book, learn about the cryptography fundamentals—and then apply them! Explore algorithms for symmetric and asymmetric cryptography and see how to use encryption strategies to enforce data and web security. Put modern cryptography principles to work in real-world scenarios: cloud environments, cryptocurrency, artificial intelligence, quantum computing, and more. Build the cryptography skills you need to manage today’s security threats!

Includes a foreword by Dr. Taher Elgamal, inventor of the Elgamal cryptosystem and known as the "father of SSL".
  • Use symmetric and asymmetric cryptography to protect your data
  • Work with hash functions, digital signatures, MAC, PKI, and encryption key management
  • Learn about homomorphic encryption, post-quantum encryption, cloud encryption, and other applications of modern cryptography
About the E-book About the Book E-book in full color. PDF (25 MB) and EPUB (14 MB) files for download, DRM-free with personalized digital watermark. Copy and paste, bookmarks, and print-out permitted. Table of contents, in-text references, and index fully linked. Including online book edition in dedicated reader application. 325 pages, paperback. Reference book format 7 x 10 in. Foreword by Dr. Taher Elgamal. Printed black and white on 50# offset paper from sustainable sources. Reader-friendly serif font (TheAntiquaB 9.5 Pt.). One-column layout.

In this book, you’ll learn about:

  1. Cryptography Concepts

    Master the theory behind cryptography. Walk through the principles, methods, and algorithms that are used to protect your data. Ensure data confidentiality, integrity, and authenticity using techniques such as hash functions, digital signatures, and MAC.

  2. Practical Applications

    Learn about modern cryptography in practice. From managing encryption keys in the cloud, to securing AI systems and machine learning models, to developing quantum-resistant cryptography algorithms, see how cryptography is used to protect data.

  3. Expert Tips, Examples, and Best Practices

    Unravel cryptography topics with guidance from an experienced security professional. Practical demonstrations, detailed formulas, and tips and tricks will help you navigate the complex world of data encryption.

Highlights include:

  • Symmetric and asymmetric encryption
  • Artificial intelligence and IoT
  • Hash functions
  • Digital signatures
  • Message authentication codes (MAC)
  • Storage and network security
  • Encryption key management
  • Cloud cryptography
  • Lightweight cryptography
  • Cryptocurrencies
  • Quantum computing
  • Homomorphic encryption

Sandip Dholakia is an author, cryptographer, and information security professional. He works as a principal security architect within the Global Security and Compliance group at SAP America.

more >

You may also like:

  • Cover of Developing AI Applications

    Developing AI Applications
    An Introduction

    Metin Karatas

    402 pages, paperback

    It’s time to get practical about AI. Move past playing around with chatbots and plugging your data into others’ applications—learn how to create your own! Walk through key AI methods like decision trees, convolutional layers, cluster analysis, and more. Get More about the book

    from $39.99

    Available

    E-book | Print edition | Bundle
  • Cover of Hacking and Security

    Hacking and Security
    The Comprehensive Guide to Penetration Testing and Cybersecurity

    Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling

    1141 pages, paperback

    Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then expand your understanding of More about the book

    from $54.99

    Available

    E-book | Print edition | Bundle