Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam  2200349 i 4500 
001    sky302080607 
003    SKY 
005    20210301124654.0 
008    200831t20202020nyua          001 0 eng d 
015    GBC0D5202|2bnb 
020    9781484260555 (paperback) 
020    1484260554 
040    UKMGB|beng|erda|cUKMGB|dOCLCO|dBDX|dLQU|dOCLCF|dJRZ|dSKYRV
       |dIMmBT|dUtOrBLW 
082 04 005.824|223 
092    005.8|bCIE 2020 
100 1  Ciesla, Robert,|eauthor. 
245 10 Encryption for organizations and individuals :|bbasics of 
       contemporary and quantum cryptography /|cRobert Ciesla 
264  1 New York :|bApress,|c[2020] 
264  4 |c©2020 
300    xxi, 286 pages :|billustrations (black and white) ;|c24 cm
336    text|2rdacontent 
336    still image|2rdacontent 
337    unmediated|2rdamedia 
338    volume|2rdacarrier 
500    Includes index 
505 00 |tChapter 1: The First Era of Digital Encryption --
       |tChapter 2: A Medium-Length History of Digital 
       Cryptography --|tChapter 3: The AES and Other Established 
       Cryptographic Technologies --|tChapter 4: You, Your 
       Organization, and Cryptographic Security --|tChapter 5: 
       Common Attacks Against Cryptographic Systems --|tChapter 6
       : Creating Extremely Secure Encrypted Systems --|tChapter 
       7: Prohibitions and Legal Issues --|tChapter 8: Quantum 
       Computing: The Next Big Paradigm --|tChapter 9: The 
       Rollicking World of Quantum Mechanics --|tChapter 10: 
       Quantum Information Science 101 --|tChapter 11: Quantum 
       Cryptography --|tChapter 12: Quantum Key Distribution 
       Under Attack --|tChapter 13: Implementations of QKD --
       |tChapter 14: Post-Quantum Cryptography 
520    Cryptography and encryption aren't just for geeks and 
       spies--theyre also part of our daily lives. This book 
       enlightens you with the basics of digital cryptography and
       covers the must-do practices organizations need to 
       implement when it comes to fending off data theft and 
       eavesdroppers. You will uncover the concepts of digital 
       encryption and examine key digital encryption algorithms 
       and their various applications. Gauging cryptography from 
       an enterprise perspective, you will get an in-depth look 
       at common attacks that can occur in your systems and lean 
       how to counter them Moving on to quantum computing, you 
       will discover how it differs from the current computing 
       paradigm and understand its potential for the future. 
       After clearing the basics, you will take a close look at 
       how quantum computers work in practice. Shifting focus to 
       quantum cryptography, you will learn more about quantum 
       key distribution (QKD) and how it differs from present-day
       encryption methodologies. You will also consider the 
       current implementations of QKD, including distribution 
       systems by SwissQuantum and QKD-distribution networks 
       provided by the DARPA Quantum Network. Ultimately, you 
       will learn the means of defending against cryptographic 
       attacks in the up-and-coming quantum age, such as 
       utilizing zero-knowledge proof (ZKP) systems. Deepen your 
       knowledge of cryptographic concepts and be introduced to 
       the new paradigm of quantum cryptography with this book. 
       You will: Appreciate how digital encryption algorithms 
       work Secure your infrastructure from cryptographic attacks
       Understand the basics of quantum information science 
       Discover how cryptography relates to quantum computing 
       Implement Quantum Key Distribution (QKD) 
650  0 Data encryption (Computer science) 
650  0 Cryptography. 
650  0 Quantum computing. 
Location Call No. Status
 Naper Blvd. Adult Nonfiction  005.8 CIE 2020    AVAILABLE