The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
MARK STAMP, PHD, is Professor of Computer Science at San Jose State University. In addition to his experience working in private industry and academia, Dr. Stamp spent seven years as a cryptanalyst for the U.S. National Security Agency. He is the author of Information Security: Principles and Practice.
RICHARD M. LOW, PHD, is Lecturer in the Department of Mathematics at San Jose State University. His research interests include cryptography, combinatorics, and group theory.
A CASE-BASED APPROACH TO CRYPTANALYSIS THAT EXPLAINS HOW AND WHY ATTACKS CAN HAPPEN
Applied Cryptanalysis focuses on practical attacks on real-world ciphers. Using detailed case studies, the authors demonstrate how modern cryptographic systems are broken, and they do so with a minimum of complex mathematics and technical jargon. All major classes of attacks are covered, providing IT professionals with the knowledge necessary for effective security implementation within their organizations. Each chapter concludes with a series of problems that enables the reader to practice and fine-tune their own cryptanalysis skills. Applied Cryptanalysis can serve as a textbook for a cryptanalysis course or for independent study.
The text is organized around four major themes:
Clear and concise, this practical case-based approach to cryptanalysis is a valuable and timely resource.
A CASE-BASED APPROACH TO CRYPTANALYSIS THAT EXPLAINS HOW AND WHY ATTACKS CAN HAPPEN
Applied Cryptanalysis focuses on practical attacks on real-world ciphers. Using detailed case studies, the authors demonstrate how modern cryptographic systems are broken, and they do so with a minimum of complex mathematics and technical jargon. All major classes of attacks are covered, providing IT professionals with the knowledge necessary for effective security implementation within their organizations. Each chapter concludes with a series of problems that enables the reader to practice and fine-tune their own cryptanalysis skills. Applied Cryptanalysis can serve as a textbook for a cryptanalysis course or for independent study.
The text is organized around four major themes:
Clear and concise, this practical case-based approach to cryptanalysis is a valuable and timely resource.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Hardback. Zustand: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Bestandsnummer des Verkäufers GOR013865097
Anzahl: 1 verfügbar
Anbieter: HPB-Red, Dallas, TX, USA
hardcover. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Bestandsnummer des Verkäufers S_422483202
Anzahl: 1 verfügbar
Anbieter: -OnTimeBooks-, Phoenix, AZ, USA
Zustand: very_good. Gently read. May have name of previous ownership, or ex-library edition. Binding tight; spine straight and smooth, with no creasing; covers clean and crisp. Minimal signs of handling or shelving. 100% GUARANTEE! Shipped with delivery confirmation, if you're not satisfied with purchase please return item for full refund. Ships USPS Media Mail. Bestandsnummer des Verkäufers OTV.047011486X.VG
Anzahl: 1 verfügbar
Anbieter: thebookforest.com, San Rafael, CA, USA
Zustand: Like New. Signed (inscribed) by author on title page. Page block firm and clean, binding unblemished, boards straight, without markings of any kind. Fine, like new condition. Supporting Bay Area Friends of the Library since 2010. Well packaged and promptly shipped. Bestandsnummer des Verkäufers BAY_06_SH_031239
Anzahl: 1 verfügbar
Anbieter: GoldBooks, Denver, CO, USA
Zustand: new. Bestandsnummer des Verkäufers 58A73_89_047011486X
Anzahl: 1 verfügbar
Anbieter: Lucky's Textbooks, Dallas, TX, USA
Zustand: New. Bestandsnummer des Verkäufers ABLIING23Feb2215580218885
Anzahl: Mehr als 20 verfügbar
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
HRD. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Bestandsnummer des Verkäufers FW-9780470114865
Anzahl: 15 verfügbar
Anbieter: Grand Eagle Retail, Bensenville, IL, USA
Hardcover. Zustand: new. Hardcover. The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic. This book provides an introduction to applied cryptanalysis, that is, cryptanalysis that actually breaks ciphers and/or systems. The emphasis is on detailed case studies of specific ciphers and attacks. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Bestandsnummer des Verkäufers 9780470114865
Anbieter: Chiron Media, Wallingford, Vereinigtes Königreich
Hardcover. Zustand: New. Bestandsnummer des Verkäufers 6666-WLY-9780470114865
Anzahl: Mehr als 20 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. pp. 424. Bestandsnummer des Verkäufers 7522100
Anzahl: 3 verfügbar