Modern cryptography : applied mathematics for encryption and information security / Chuck Easttom.

Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Find out how to use ciphers and...

Full description

Bibliographic Details
Main Author: Easttom, Chuck (Author)
Language:English
Published: New York : McGraw-Hill Education, [2016]
Subjects:
Physical Description:xix, 394 pages ; 23 cm
Format: Book

MARC

LEADER 00000cam a2200000 i 4500
001 in00005971425
003 OCoLC
005 20220616041445.0
008 151008s2016 nyu b 001 0 eng
010 |a  2015033200 
015 |a GBB5C8656  |2 bnb 
016 7 |a 017554192  |2 Uk 
019 |a 907445863  |a 1005094460 
020 |a 9781259588082 (alk. paper) 
020 |a 1259588084 (alk. paper) 
035 |a (OCoLC)923665686  |z (OCoLC)907445863  |z (OCoLC)1005094460 
040 |a DLC  |b eng  |e rda  |c DLC  |d YDX  |d CDX  |d YDXCP  |d CHVBK  |d BTCTA  |d BDX  |d RDF  |d OCLCF  |d NZLPP  |d OCLCO  |d CHILD  |d OCLCA  |d OCL  |d UKMGB  |d EEM  |d UtOrBLW 
042 |a pcc 
049 |a EEMR 
050 0 0 |a TK5102.94  |b .E225 2016 
082 0 0 |a 005.8/2  |2 23 
100 1 |a Easttom, Chuck,  |e author.  |0 http://id.loc.gov/authorities/names/n2001005624 
245 1 0 |a Modern cryptography :  |b applied mathematics for encryption and information security /  |c Chuck Easttom. 
264 1 |a New York :  |b McGraw-Hill Education,  |c [2016] 
300 |a xix, 394 pages ;  |c 23 cm 
336 |a text  |b txt  |2 rdacontent 
337 |a unmediated  |b n  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. 
650 0 |a Data encryption (Computer science)  |0 http://id.loc.gov/authorities/subjects/sh94001524 
650 0 |a Information networks  |x Security measures  |x Mathematics.  |0 http://id.loc.gov/authorities/subjects/sh85066145 
650 0 |a Computer networks  |x Security measures  |x Mathematics.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 0 |a Computer security  |x Mathematics.  |0 http://id.loc.gov/authorities/subjects/sh90001862 
650 7 |a Kryptologie.  |2 gnd  |0 (DE-588)4033329-2 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
907 |y .b131680638  |b 190903  |c 190530 
998 |a mn  |b 190809  |c m  |d a   |e -  |f eng  |g nyu  |h 0  |i 2 
994 |a C0  |b EEM 
999 f f |i 63f67322-c33b-5b9d-9978-799c6641c17e  |s 675e2cb9-9a17-51ec-894f-25b6bb1df83c  |t 0 
952 f f |p Can Circulate  |a Michigan State University-Library of Michigan  |b Michigan State University  |c MSU Main Library  |d MSU Main Library  |t 0  |e TK5102.94 .E225 2016  |h Library of Congress classification  |i Printed Material  |m 31293036733701  |n 1