Cryptography: the key to digital security, how it works, and why it matters
"A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
W. W. Norton & Company, Inc.
[2020]
|
Ausgabe: | First edition |
Schlagworte: | |
Zusammenfassung: | "A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our car doors with electronic key fobs. Broadly defined as a set of tools for establishing the basic elements of security in cyberspace, cryptography enables us to keep secrets and determine who we are talking to, as well as to detect changes to information. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, and bitcoin transactions-in short, everything we do online. Yet, while we all rely crucially on encryption technology for our personal security, it is not without controversy. By preventing access to information in cyberspace, cryptography can hamper criminal investigations and obstruct national security efforts, and when deployed with ransomware it can even be used as a means of attacking computers. In this book, information security expert Keith Martin illuminates the many functions of cryptography and how we use it, leaving readers with a profound perspective on their own personal security"-- |
Beschreibung: | 309 Seiten 24 cm |
ISBN: | 9781324004295 1324004290 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046793500 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 200703s2020 b||| 00||| eng d | ||
020 | |a 9781324004295 |9 978-1-324-00429-5 | ||
020 | |a 1324004290 |9 1-324-00429-0 | ||
035 | |a (OCoLC)1164658818 | ||
035 | |a (DE-599)BVBBV046793500 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Martin, Keith M. |e Verfasser |0 (DE-588)1020725265 |4 aut | |
245 | 1 | 0 | |a Cryptography |b the key to digital security, how it works, and why it matters |c Keith Martin |
250 | |a First edition | ||
264 | 1 | |a New York, NY |b W. W. Norton & Company, Inc. |c [2020] | |
300 | |a 309 Seiten |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a "A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our car doors with electronic key fobs. Broadly defined as a set of tools for establishing the basic elements of security in cyberspace, cryptography enables us to keep secrets and determine who we are talking to, as well as to detect changes to information. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, and bitcoin transactions-in short, everything we do online. Yet, while we all rely crucially on encryption technology for our personal security, it is not without controversy. By preventing access to information in cyberspace, cryptography can hamper criminal investigations and obstruct national security efforts, and when deployed with ransomware it can even be used as a means of attacking computers. In this book, information security expert Keith Martin illuminates the many functions of cryptography and how we use it, leaving readers with a profound perspective on their own personal security"-- | |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Data encryption (Computer science) | |
653 | 0 | |a Cryptography | |
653 | 0 | |a Cryptography | |
653 | 0 | |a Data encryption (Computer science) | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | |5 DE-604 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032202407 |
Datensatz im Suchindex
_version_ | 1804181585706090496 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Martin, Keith M. |
author_GND | (DE-588)1020725265 |
author_facet | Martin, Keith M. |
author_role | aut |
author_sort | Martin, Keith M. |
author_variant | k m m km kmm |
building | Verbundindex |
bvnumber | BV046793500 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1164658818 (DE-599)BVBBV046793500 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02579nam a2200409 c 4500</leader><controlfield tag="001">BV046793500</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200703s2020 b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781324004295</subfield><subfield code="9">978-1-324-00429-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1324004290</subfield><subfield code="9">1-324-00429-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1164658818</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046793500</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Martin, Keith M.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1020725265</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography</subfield><subfield code="b">the key to digital security, how it works, and why it matters</subfield><subfield code="c">Keith Martin</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">W. W. Norton & Company, Inc.</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">309 Seiten</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our car doors with electronic key fobs. Broadly defined as a set of tools for establishing the basic elements of security in cyberspace, cryptography enables us to keep secrets and determine who we are talking to, as well as to detect changes to information. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, and bitcoin transactions-in short, everything we do online. Yet, while we all rely crucially on encryption technology for our personal security, it is not without controversy. By preventing access to information in cyberspace, cryptography can hamper criminal investigations and obstruct national security efforts, and when deployed with ransomware it can even be used as a means of attacking computers. In this book, information security expert Keith Martin illuminates the many functions of cryptography and how we use it, leaving readers with a profound perspective on their own personal security"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032202407</subfield></datafield></record></collection> |
id | DE-604.BV046793500 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:53:45Z |
indexdate | 2024-07-10T08:54:00Z |
institution | BVB |
isbn | 9781324004295 1324004290 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032202407 |
oclc_num | 1164658818 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | 309 Seiten 24 cm |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | W. W. Norton & Company, Inc. |
record_format | marc |
spelling | Martin, Keith M. Verfasser (DE-588)1020725265 aut Cryptography the key to digital security, how it works, and why it matters Keith Martin First edition New York, NY W. W. Norton & Company, Inc. [2020] 309 Seiten 24 cm txt rdacontent n rdamedia nc rdacarrier "A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our car doors with electronic key fobs. Broadly defined as a set of tools for establishing the basic elements of security in cyberspace, cryptography enables us to keep secrets and determine who we are talking to, as well as to detect changes to information. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, and bitcoin transactions-in short, everything we do online. Yet, while we all rely crucially on encryption technology for our personal security, it is not without controversy. By preventing access to information in cyberspace, cryptography can hamper criminal investigations and obstruct national security efforts, and when deployed with ransomware it can even be used as a means of attacking computers. In this book, information security expert Keith Martin illuminates the many functions of cryptography and how we use it, leaving readers with a profound perspective on their own personal security"-- Chiffrierung (DE-588)4352893-4 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Data encryption (Computer science) Cryptography Kryptologie (DE-588)4033329-2 s Chiffrierung (DE-588)4352893-4 s DE-604 |
spellingShingle | Martin, Keith M. Cryptography the key to digital security, how it works, and why it matters Chiffrierung (DE-588)4352893-4 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4352893-4 (DE-588)4033329-2 |
title | Cryptography the key to digital security, how it works, and why it matters |
title_auth | Cryptography the key to digital security, how it works, and why it matters |
title_exact_search | Cryptography the key to digital security, how it works, and why it matters |
title_exact_search_txtP | Cryptography the key to digital security, how it works, and why it matters |
title_full | Cryptography the key to digital security, how it works, and why it matters Keith Martin |
title_fullStr | Cryptography the key to digital security, how it works, and why it matters Keith Martin |
title_full_unstemmed | Cryptography the key to digital security, how it works, and why it matters Keith Martin |
title_short | Cryptography |
title_sort | cryptography the key to digital security how it works and why it matters |
title_sub | the key to digital security, how it works, and why it matters |
topic | Chiffrierung (DE-588)4352893-4 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Chiffrierung Kryptologie |
work_keys_str_mv | AT martinkeithm cryptographythekeytodigitalsecurityhowitworksandwhyitmatters |