49,99 €
inkl. MwSt.
Versandkostenfrei*
Sofort lieferbar
payback
25 °P sammeln
  • Broschiertes Buch

Security professionals, you know encryption is essential to protect your data. In this book, learn about the fundamental concepts of cryptography-and then apply them! Explore algorithms for symmetric and asymmetric cryptography and see how to use encryption strategies to enforce storage and network security. Put modern cryptography principles to work in real-world scenarios: cloud environments, cryptocurrency, artificial intelligence, quantum computing, and more. Build the cryptography skills you need to manage today's security threats!
In this book, you'll learn about:
a. Cryptography
…mehr

Produktbeschreibung
Security professionals, you know encryption is essential to protect your data. In this book, learn about the fundamental concepts of cryptography-and then apply them! Explore algorithms for symmetric and asymmetric cryptography and see how to use encryption strategies to enforce storage and network security. Put modern cryptography principles to work in real-world scenarios: cloud environments, cryptocurrency, artificial intelligence, quantum computing, and more. Build the cryptography skills you need to manage today's security threats!

In this book, you'll learn about:

a. Cryptography Concepts
Master the theory behind cryptography. Walk through the principles, methods, and algorithms that are used to protect your data. Ensure data confidentiality, integrity, and authenticity using techniques such as hash functions, digital signatures, and MAC.

b. Practical Applications
Learn about modern cryptography in practice. From managing encryption keys in the cloud, to securing AI systems and machine learning models, to developing quantum-resistant cryptography algorithms, see how cryptography is used to protect data.

c. Expert Tips, Examples, and Best Practices
Unravel cryptography topics with guidance from an experienced security professional. Practical demonstrations, detailed formulas, and tips and tricks will help you navigate the complex world of data encryption.

Highlights include:
1) Symmetric and asymmetric encryption
2) Hash functions
3) Digital signatures
4) Message authentication codes (MAC)
5) Storage and network security
6) Encryption key management
7) Cloud cryptography
8) Lightweight cryptography
9) Cryptocurrencies
10) Artificial intelligence and IoT
11) Quantum computing
12) Homomorphic encryption
13) Standards and best practices

Autorenporträt
Sandip Dholakia is an author, cryptographer, and information security professional. He works as a principal security architect within the Global Security and Compliance group at SAP America. Sandip is a co-chair of the Cryptography Center of Excellence (CoE) and a core member of the AI for Security task force at SAP. As a co-chair of Cryptography CoE, he is actively engaged in developing an enterprise-wide cryptoagility program, focusing on post-quantum cryptography strategies. Before joining SAP, Sandip was an information security architect at Cisco and a security architect and compliance leader at General Motors. Sandip holds a US patent and defensive publication for designing and developing a cryptography-based antitheft algorithm. He has also published a book and papers about various security topics, including log management, zero-trust architecture, encryption, and security configuration. Sandip graduated from Carnegie Mellon University with dual master's degrees in software engineering and information systems management. He holds CISSP, CCSP, CCSK, GWAPT, and AWS security certifications. Please visit Google Scholar for the complete list of his publications.