67,95 €
67,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
34 °P sammeln
67,95 €
67,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
34 °P sammeln
Als Download kaufen
67,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
34 °P sammeln
Jetzt verschenken
67,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
34 °P sammeln
  • Format: PDF

Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography and provide understanding of how privacy, identity provision, and integrity can be enhanced with the usage of encryption. The book has many novel features including: full provision of web-based material on almost every topic covered; provision of additional on-line material such as videos, source code, and…mehr

  • Geräte: PC
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 104.32MB
Produktbeschreibung
Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography and provide understanding of how privacy, identity provision, and integrity can be enhanced with the usage of encryption. The book has many novel features including: full provision of web-based material on almost every topic covered; provision of additional on-line material such as videos, source code, and labs; and coverage of emerging areas such as Blockchain, Light-weight Cryptography, and Zero-knowledge Proofs.Key areas covered include: Fundamentals of Encryption, Public Key Encryption, Symmetric Key Encryption, Hashing Methods, Key Exchange Methods, Digital Certificates and Authentication, Tunneling, Crypto Cracking, Light-weight Cryptography, Blockchain, and Zero-knowledge Proofs. This book provides extensive support through the associated website of: http://asecuritysite.com/encryption

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Bill Buchanan OBE is a Professor in the School of Computing at Edinburgh Napier University, and a Fellow of the BCS and the IET. He was appointed an Of¿cer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security. Currently he leads the Centre for Distributed Computing, Networks, and Security at Edinburgh Napier University and The Cyber Academy (http://thecyberacademy.org). His main research focus is around information sharing, IoT, e-Health, threat analysis, cryptography, and triage within digital forensics. This has led to several World-wide patents, and in three highly successful spin-out companies: Zonefox; Symphonic Software; and Cyan Forensics. Bill regularly appears on TV and radio related to computer security, and has given expert evidence to both the Scottish and UK Parliaments. He has been named as one of the Top 100 people for Technology in Scotland for in every year from 2012 onwards. Bill was also included in the Future Scot "Top 50 Scottish Tech People Who Are Changing The World". Recently his work on Secret Shares received "Innovation of the Year" at the Scottish Knowledge Exchange Awards, for a research project which involves splitting data into secret shares, and can then be distributed across a public Cloudbased infrastructure. He was included in the JISC Top 50 Higher Education Social Media In¿uencers. He has published over 250 research papers and 27 academic books. His current work focuses on the secret share methods, and especially in how documents can be stored securely in public cloud based systems. The current cryptography work around secret shares has won several awards, and is the basis for new funded work. This is further enhanced with work around sticky policies and identity based encryption, and which aims to integrate access rights on document within public cloud systems. This includes the storage of high risk documents, such as health care records and ¿nancial information. Along with this he has new research work which integrates machine learning into insider threat detection, and within side channel analysis on embedded systems. Bill's work around information sharing models for trust and governance, which was funded through two EPSRC grants, is now showing signi¿cant impact with the integration of over 7,000 health and social care entities within London, and which will be able to share information in a secure and trusted way.