Commencez à lire Everyday Cryptography sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Everyday Cryptography: Fundamental Principles and Applications
 
Agrandissez cette image
 

Everyday Cryptography: Fundamental Principles and Applications [Format Kindle]

Keith M. Martin
5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)

Prix conseillé : EUR 36,19 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 43,86
Prix Kindle : EUR 25,33 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 18,53 (42%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 25,33  
Broché EUR 40,54  




Les clients ayant acheté cet article ont également acheté


Descriptions du produit

Revue de presse

It is a very leisurely reading, well-structured and very detailed. It does not assume any mathematical knowledge, making it suitable for being used as a manual for a course on introduction to cryptography. (Vicente Muñoz, the European Mathematical Society)

On a page per page basis it actually represents great value, and should achieve a long shelf life as both textbook and good reference source In terms of a score; for students a 9.5, practitioners 8.5 and general interest readers 8.5, giving an overall average of 9/10. Overall, an excellent book. (Mike Rees MBCS CITP, The British Computer Society)

Everyday Cryptography: Fundamental Principles and Applications is an excellent reference. (Jawa Eyes)

Présentation de l'éditeur

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on
transient current technologies and over-whelming theoretical research.

Everyday Cryptography is a self-contained and widely accessible introductory text. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematical techniques underpinning cryptographic mechanisms, though a short appendix is included for those looking for a deeper appreciation of some of the concepts involved. By the end of this book, the reader will not only be able to understand the practical issues concerned with the
deployment of cryptographic mechanisms, including the management of cryptographic keys, but will also be able to interpret future developments in this fascinating and increasingly important area of technology.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 2292 KB
  • Nombre de pages de l'édition imprimée : 552 pages
  • Editeur : OUP Oxford (1 mars 2012)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B007NVLB66
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)
  • Classement des meilleures ventes d'Amazon: n°182.202 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoiles
0
5.0 étoiles sur 5
5.0 étoiles sur 5
Commentaires client les plus utiles
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Un tres bon livre pour les IT security specialists 13 avril 2012
Par G C
Format:Broché|Achat vérifié
Avant toute chose je pense important de signaler que ce livre est base sur le cours d'initiation a la cryptographie de la Royal Holloway University of London. En tant que tel je le considere comme un complement indispensable pour tout etudiant qui devra passer l'examen relatif a ce module car ce livre fournit une version plus detaillee que les notes de cours ce qui est bien utile pour les passages plus ardus.

D'une facon plus generale le livre est interessant a plusieurs titres car en plus de couvrir les fondamentaux de la cryptographie, il met aussi en lumiere toute une serie de problematiques liees a la cryptographie. C'est probablement la partie sur laquelle il se demarque le plus des autres ouvrages d'introduction que j'ai pu lire auparavant. Il traite par exemple de maniere tres complete le key management, les differences entre une signature digitale et ecrite ou encore des questions plus pratiques comme vaut-il mieux d'abord encrypter puis signer ou l'inverse. J'ai egalement apprecie la partie liee aux applications utilisant la cryptographie notamment pour les communications GSM (l'inevitable SSL est bien entendu aussi de la partie).

Le livre se divise en chapitres bien structures ( un peu d'histoire, symmetric crypto, public key crypto, digital signatures, data integrity, authentication, key management, ... ) qui se terminent toujours avec une serie de questions permettant d'evaluer sa comprehension du sujet ( les reponses ne sont malheureusement pas fournies ce qui est un peu dommage ). Un appendix avec quelques notions de math, binaire, hex, ... est aussi disponible. Le livre ne requiert pas de connaissances mathematiques prealables mais il donne quand meme un certain niveau de details en ce qui concerne RSA et ElGamal.
Lire la suite ›
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.7 étoiles sur 5  3 commentaires
9 internautes sur 11 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent reference and overview of encryption and cryptography 15 octobre 2012
Par Ben Rothke - Publié sur Amazon.com
Format:Broché
When Bruce Schneier first published Applied Cryptography in 1994, it was a watershed event, given that is was one of the first comprehensive texts on the topic that existed outside of the military.

In the nearly 20 years since the book came out, a lot has changed in the world of encryption and cryptography. A number of books have been written to fill that gap and Everyday Cryptography: Fundamental Principles and Applications is one of them that have recently been published.

While the title Everyday Cryptography may give the impression that this is an introductory text; that is not the case. Author Keith Martin is the director of the information security group at Royal Holloway, a division of the University of London, and the book is meant for information security professionals in addition to being used as a main reference for a principles of cryptography course. The book is also a great reference for those studying for the CISSP exam.

While the book notes that almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematical techniques underpinning cryptographic mechanisms. That might be a bit of a misnomer as the book does get into the mathematics of cryptography. While the mathematics in the book is not overwhelming, they are certainly not underwhelming. For those that want a deeper look, the book includes an appendix for many of the mathematical concepts detailed in the book.

Two benefits of the book are that it stresses practical aspects of cryptography and real-world scenarios. The mathematics detailed avoids number theory with a focus on practicability. It also shows how cryptography is used as the underlying technology behind information security, rather than simply focusing on the abstracts of the potential of cryptography.

With that, the books 13 (made up of 4 parts) chapters provide a comprehensive overview of the theory and practice around all as aspects of contemporary cryptography. Each of the chapters end with a summary, detailed lists of items for further reading, and sets of penetration questions that challenge the reader. Readers are advised to spend time on these questions as it is often easy for the reader to feel that they understand the material. The questions can quickly humble the reader and show them that it may not be the case.

Part 1 is titled Setting the Scene and provides a comprehensive introduction to the fundamental of cryptography. Chapter 1 (freely available here) details the basic principles about cryptography and provides a high-level introduction.

Chapter 2 provides a good overview of the history of cryptography. It details a number of obsolete, yet historically relevant ciphers, such as the Vigenère cipher from the 1500's, to the Playfair cipher from the mid-1800's and others. Martin provides a good overview of the cryptanalysis of the Vigenère cipher and lessons learned from it.

Chapters 4-9 comprise part 2, and provide a thorough overview of the various forms of encryption (symmetric and asymmetric) and digital signatures. This section gets into some of the deeper mathematics of cryptography. While the author states that almost no prior knowledge of mathematics is needed; those without a background will surely be confused by some of the material.

Chapter 7 closes with a good overview of the relationship between digital signatures and handwritten signatures. The author notes the importance of resisting any temptation to consider digital signatures as a direct electronic equivalent of handwritten signatures. He then provides a detailed outline of the environmental, security, practical and flexibility differences between them.

Key management is one of the most important aspects of cryptography and often the most difficult to execute on. Part of the difficulty around key management is at the user level, with key updates, passphrase management and more. Ultimately, effective key management is essential to the underlying security of the cryptosystem. The 2 chapters in part 3 provide a thorough synopsis of the fundamentals of key management.

Part 4 closes the book with two chapters on practical cryptographic applications. Chapter 12 details how cryptography can be used on the internet, secure payment cards, video broadcasting and more.

The book concludes with an appendix on the mathematics of cryptography, which takes a look at the basic mathematical concepts the underlie some of the material in the book.

This book is not for the fainthearted and is not an introductory text on the topic. It is meant for the advanced reader or someone taking a college level course. For such a reader serious about a significant overview of the essentials on the topic, Everyday Cryptography: Fundamental Principles and Applications is an excellent reference.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Readable Cryptography 13 juillet 2013
Par F. Scholl - Publié sur Amazon.com
Format:Broché|Achat vérifié
Cryptography is like music. No matter how many times you listen to a piece of music, you always hear something different. Also, although there are rules of composition, you need creativity to make it work. Professor Martin's book offers a number of readable insights into cryptography, a subject that many security professionals have studied before. This is a book that emphasizes practical considerations over math and does a good job of this. Expecially interesting are discussions on "academic" security attacks; a clear exposition of DES; concepts of deterministic and non-deterministic random number generators; SSL cryptography; and mobile phone crypto. The book is a text book for MS level students. So it does read like a text book, and may be a little difficult for everyday or cover to cover reading. Overall, for most security professionals, this book is worth having and absorbing.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent book! 4 novembre 2013
Par Matt Adam - Publié sur Amazon.com
Format:Broché|Achat vérifié
Used this book for my Data Protection Class! Excellent book!
I'm not a math guy, so there were a few sections that were over my head. Overall, it was understandable and great information!
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique