Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
Fundamental security concepts like cryptography and digital signatures are becoming as much a part of our everyday lives as megabytes and the Internet. Anyone working with computer security--security professionals, network administrators, IT managers, CEOs, and CIOs--need to have a comfortable understanding of the cryptographic concepts in this book.
Cryptography Decrypted shows you how to safeguard digital possessions. It is a clear, comprehensible, and practical guide to the essentials of computer cryptography, from Caesar's Cipher through modern-day public key. Cryptographic capabilities like detecting imposters and stopping eavesdropping are thoroughly illustrated with easy-to-understand analogies, visuals, and historical sidebars.
You need little or no background in cryptography to read Cryptography Decrypted. Nor does it require technical or mathematical expertise. But for those with some understanding of the subject, this book is comprehensive enough to solidify knowledge of computer cryptography and challenge those who wish to explore the high-level math appendix.
Divided into four parts, the book explains secret keys and secret key methods like DES, public and private keys, and public key methods like RSA; how keys are distributed through digital certificates; and three real-world systems. Numerous graphics illustrate and clarify common cryptographic terminology throughout.You will find coverage of such specific topics as:
"Even after ten years working in the field of information protection for a major electronics manufacturing company, I learned a lot from this book. I think you will too."
--From the Foreword by John Kinyon
H.X. Mel consults and develops computer systems for organizations such as Lucent, Xerox, MIT, the U.S. Government, Motorola, Goldman Sachs, and PricewaterhouseCoopers. Doris Baker is a freelance technical writer and editor.
Very well explained the complex subject in the simplest way. Best written tec book.Published 4 months ago by Zhimin Lin
Amazing book. Really fun read, and although its been years since I read it, I still remember a lot of it. Read morePublished 7 months ago by beforethebop
The book is good for beginners and makes it easier to understand. It met everything the description said, though i should have paid more attention to the publication date - a lot... Read morePublished 8 months ago by Kyle
Book and other material were as good as promised. Studying to get my MS in Information Assurance, this book is full of good material and is in great condition.Published 15 months ago by William M. Johnson
Books where used for a college course to help students understand the hidden messages behind code and to decypher code.Published on August 27, 2011 by NY'r
A very thorough introduction to crytopgraphy. Illustrations very helpful in explaining the concepts. Read morePublished on March 22, 2010 by David M. Alexander
This book lays out the concept very well and book is fun to read. I really loved reading the book. The underline mathematics is explained with enough detail for one to appreciate... Read morePublished on October 3, 2009 by Alok