Kryptografia

Książki z tego działu pozwolą wam odkryć tajemnice kryptografii i szyfrowania danych. Lektura publikacji z kategorii Kryptografia pozwoli wam wnikliwie przyjrzeć się zagadnieniom takim jak: symetryczny szyfr blokowy (DES) czy RSA - asymetryczny algorytm kryptograficzny oraz ocenić ich rolę w zabezpieczaniu sieci przed włamaniem.

Dzięki tym podręcznikom opanujecie wykorzystywanie w praktyce wiedzy z dziedziny szyfrowania i kryptografii, jak zastosowanie algorytmów PGP, protokołów SSL i SSH czy implementacja algorytmów kryptograficznych w PHP, nie zapominając o wykorzystaniu podpisu elektronicznego.

89
Ładowanie...
EBOOK

TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz

TLS is the most widely used cryptographic protocol today, enabling e-commerce, online banking, and secure online communication. Written by Dr. Paul Duplys, Security, Privacy & Safety Research Lead at Bosch, and Dr. Roland Schmitz, Internet Security Professor at Stuttgart Media University, this book will help you gain a deep understanding of how and why TLS works, how past attacks on TLS were possible, and how vulnerabilities that enabled them were addressed in the latest TLS version 1.3. By exploring the inner workings of TLS, you’ll be able to configure it and use it more securely.Starting with the basic concepts, you’ll be led step by step through the world of modern cryptography, guided by the TLS protocol. As you advance, you’ll be learning about the necessary mathematical concepts from scratch. Topics such as public-key cryptography based on elliptic curves will be explained with a view on real-world applications in TLS. With easy-to-understand concepts, you’ll find out how secret keys are generated and exchanged in TLS, and how they are used to creating a secure channel between a client and a server.By the end of this book, you’ll have the knowledge to configure TLS servers securely. Moreover, you’ll have gained a deep knowledge of the cryptographic primitives that make up TLS.

90
Ładowanie...
EBOOK

Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens

Sean Au, Thomas Power(GBP)

Tokenomics is the economy of this new world. This is a no-holds-barred, in-depth exploration of the way in which we can participate in the blockchain economy. The reader will learn the basics of bitcoin, blockchains, and tokenomics; what the very first ICO was; and how over a period of 5 years, various projects managed to raise the enormous sums of money they did. The book then provides insights from ICO experts and looks at what the future holds. By comparing the past, current, and future of this technology, the book will inform anyone, whatever motivates their interest.The crypto shift of blockchains, ICOs, and tokens is much more than just buying bitcoins, creating tokens, or raising millions in a minute in an ICO. It is a new paradigm shift from centralized to decentralized, from closed to open, and from opaqueness to transparency. ICOs and the creation of tokens during the craze of 2017 needed a lot of preparation, an understanding of cryptocurrencies and of emerging legal frameworks, but this has spurred a new movement to tokenize the world.The author gives an unbiased, authoritative picture of the current playing field, exploring the token opportunities and provides a unique insight into the developing world of this tokenized economy. This book will nourish hungry minds wanting to grow their knowledge in this fascinating area.

91
Ładowanie...
EBOOK

Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools

Scar de Courcier, Oleg Skulkin

Windows Forensics Cookbook provides recipes to overcome forensic challenges and helps you carry out effective investigations easily on a Windows platform. You will begin with a refresher on digital forensics and evidence acquisition, which will help you to understand the challenges faced while acquiring evidence from Windows systems. Next you will learn to acquire Windows memory data and analyze Windows systems with modern forensic tools. We also cover some more in-depth elements of forensic analysis, such as how to analyze data from Windows system artifacts, parse data from the most commonly-used web browsers and email services, and effectively report on digital forensic investigations. You will see how Windows 10 is different from previous versions and how you can overcome the specific challenges it brings. Finally, you will learn to troubleshoot issues that arise while performing digital forensic investigations. By the end of the book, you will be able to carry out forensics investigations efficiently.

92
Ładowanie...
EBOOK

Zbiór zadań z podstaw teoretycznych kryptografii i ochrony informacji

Tomasz Adamski

Książka jest zbiorem zadań z rozwiązaniami z podstaw teoretycznych kryptografii i kryptograficznej ochrony informacji. Poszczególne rozdziały dotyczą różnych fragmentów tej dziedziny. Rozdział pierwszy zawiera zadania z szyfrów klasycznych. Rozdział drugi koncentruje się na zagadnieniach zasadniczych dla kryptografii - teorii kongruencji i obliczeniach resztowych. Kolejne rozdziały dotyczą podstaw algebraicznych kryptografii, szyfrów symetrycznych i asymetrycznych oraz podpisów cyfrowych.