Tags
Language
Tags
October 2025
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Modern Cryptography for Cybersecurity Professionals: Learn how you can use encryption to better secure your organization's dat

    Posted By: yoyoloit
    Modern Cryptography for Cybersecurity Professionals: Learn how you can use encryption to better secure your organization's dat

    Modern Cryptography for Cybersecurity Professionals: Learn how you can use encryption to better secure your organization's dat
    by Lisa Bock

    English | 2021 | ISBN: 1838644350 | 648 pages | EPUB | 7.35 MB

    As a Cybersecurity Professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen data
    Key Features

    Discover how cryptography is used to secure data in motion as well as at rest
    Compare symmetric with asymmetric encryption and learn how a hash is used
    Get to grips with different types of cryptographic solutions along with common applications

    Book Description

    In today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.

    The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. Then, you'll delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN).

    By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption along with how a hash is used, and recognized the importance of key management and the PKI.
    What you will learn

    Learn how network attacks can compromise data
    Review practical uses of cryptography over time
    Compare how symmetric and asymmetric encryption work
    Explore how a hash can ensure data integrity and authentication
    Understand the laws that govern the need to secure data
    Discover the practical applications of cryptographic techniques
    Find out how the PKI enables trust
    Get to grips with how data can be secured using a VPN

    Who this book is for

    This book is for IT managers, security professionals, students, teachers, and anyone looking to learn more about cryptography and understand why it is important in an organization as part of an overall security framework. A basic understanding of encryption and general networking terms and concepts is needed to get the most out of this book.
    Table of Contents

    Protecting Data in Motion or at Rest
    The Evolution of Ciphers
    Evaluating Network Attacks
    Introducing Symmetric Encryption
    Dissecting Asymmetric Encryption
    Examining Hash Algorithms
    Adhering to Standards
    Using a Public Key Infrastructure
    Exploring IPsec and TLS
    Protecting Cryptographic Techniques