001433272 000__ 03776cam\a2200517\a\4500 001433272 001__ 1433272 001433272 003__ OCoLC 001433272 005__ 20230309003557.0 001433272 006__ m\\\\\o\\d\\\\\\\\ 001433272 007__ cr\un\nnnunnun 001433272 008__ 210105s2021\\\\sz\\\\\\ob\\\\000\0\eng\d 001433272 019__ $$a1232280655$$a1233061108$$a1237208703 001433272 020__ $$a9783030631154$$q(electronic bk.) 001433272 020__ $$a303063115X$$q(electronic bk.) 001433272 020__ $$z3030631141 001433272 020__ $$z9783030631147 001433272 0247_ $$a10.1007/978-3-030-63115-4$$2doi 001433272 035__ $$aSP(OCoLC)1228880672 001433272 040__ $$aYDX$$beng$$epn$$cYDX$$dGW5XE$$dEBLCP$$dOCLCO$$dAU@$$dUKBTH$$dOCLCF$$dOCL$$dN$T$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001433272 049__ $$aISEA 001433272 050_4 $$aQA76.9.A25 001433272 08204 $$a005.8/24$$223 001433272 1001_ $$aEasttom, Chuck. 001433272 24510 $$aModern cryptography :$$bapplied mathematics for encryption and information security /$$cWilliam Easttom. 001433272 260__ $$aCham :$$bSpringer,$$c2021. 001433272 300__ $$a1 online resource 001433272 336__ $$atext$$btxt$$2rdacontent 001433272 337__ $$acomputer$$bc$$2rdamedia 001433272 338__ $$aonline resource$$bcr$$2rdacarrier 001433272 504__ $$aIncludes bibliographical references. 001433272 5050_ $$aChapter 1. History of Cryptography to the 1800s -- Chapter 2. History of Cryptography from the 1800's -- Chapter 3. Basic Information Theory -- Chapter 4. Essential Number Theory and Discrete Math -- Chapter 5. Essential Algebra -- Chapter 6. Fiestel Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13. SSL/TLS -- Chapter 14. Virtual Private networks, Authentication, And Wireless Security -- Chapter 15. Military Applications -- Chapter 16. Steganography -- Chapter 17. Cryptanalysis -- Chapter 18. Cryptographic Backdoors -- Chapter 19. Quantum Computing and Cryptography. 001433272 506__ $$aAccess limited to authorized users. 001433272 520__ $$aThis textbook is a practical yet in depth guide to cryptography and its principles and practices. The book places cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background _ only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. Presents a comprehensive coverage of cryptography in an approachable format; Covers the basic math needed for cryptography _ number theory, discrete math, and algebra (abstract and linear); Includes a full suite of classroom materials including exercises, Q & A, and examples. 001433272 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 25, 2021). 001433272 650_0 $$aCryptography. 001433272 650_0 $$aData encryption (Computer science) 001433272 650_6 $$aCryptographie. 001433272 650_6 $$aChiffrement (Informatique) 001433272 655_0 $$aElectronic books. 001433272 77608 $$iPrint version:$$z3030631141$$z9783030631147$$w(OCoLC)1198977126 001433272 852__ $$bebk 001433272 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-63115-4$$zOnline Access$$91397441.1 001433272 909CO $$ooai:library.usi.edu:1433272$$pGLOBAL_SET 001433272 980__ $$aBIB 001433272 980__ $$aEBOOK 001433272 982__ $$aEbook 001433272 983__ $$aOnline 001433272 994__ $$a92$$bISE