Cryptography: the key to digital security, how it works, and why it matters
"A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
W. W. Norton & Company
2021
|
Ausgabe: | Norton paperback |
Schlagworte: | |
Zusammenfassung: | "A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our car doors with electronic key fobs. Broadly defined as a set of tools for establishing the basic elements of security in cyberspace, cryptography enables us to keep secrets and determine who we are talking to, as well as to detect changes to information. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, and bitcoin transactions-in short, everything we do online. Yet, while we all rely crucially on encryption technology for our personal security, it is not without controversy. By preventing access to information in cyberspace, cryptography can hamper criminal investigations and obstruct national security efforts, and when deployed with ransomware it can even be used as a means of attacking computers. In this book, information security expert Keith Martin illuminates the many functions of cryptography and how we use it, leaving readers with a profound perspective on their own personal security"-- |
Beschreibung: | 309 Seiten 24 cm |
ISBN: | 9780393867459 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049941487 | ||
003 | DE-604 | ||
005 | 20241217 | ||
007 | t| | ||
008 | 241107s2021 xx b||| 00||| eng d | ||
020 | |a 9780393867459 |9 978-0-393-86745-9 | ||
035 | |a (OCoLC)1492111117 | ||
035 | |a (DE-599)BVBBV049941487 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-703 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Martin, Keith M. |e Verfasser |0 (DE-588)1020725265 |4 aut | |
245 | 1 | 0 | |a Cryptography |b the key to digital security, how it works, and why it matters |c Keith Martin |
250 | |a Norton paperback | ||
264 | 1 | |a New York, NY |b W. W. Norton & Company |c 2021 | |
300 | |a 309 Seiten |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a "A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our car doors with electronic key fobs. Broadly defined as a set of tools for establishing the basic elements of security in cyberspace, cryptography enables us to keep secrets and determine who we are talking to, as well as to detect changes to information. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, and bitcoin transactions-in short, everything we do online. Yet, while we all rely crucially on encryption technology for our personal security, it is not without controversy. By preventing access to information in cyberspace, cryptography can hamper criminal investigations and obstruct national security efforts, and when deployed with ransomware it can even be used as a means of attacking computers. In this book, information security expert Keith Martin illuminates the many functions of cryptography and how we use it, leaving readers with a profound perspective on their own personal security"-- | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
653 | 0 | |a Data encryption (Computer science) | |
653 | 0 | |a Cryptography | |
653 | 0 | |a Cryptography | |
653 | 0 | |a Data encryption (Computer science) | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | |5 DE-604 | |
775 | 0 | 8 | |i Äquivalent |n Druck-Ausgabe, Hardcover |z 978-1-324-00429-5 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 978-1-324-00430-1 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035279709 |
Datensatz im Suchindex
_version_ | 1823668177586880512 |
---|---|
adam_text | |
any_adam_object | |
author | Martin, Keith M. |
author_GND | (DE-588)1020725265 |
author_facet | Martin, Keith M. |
author_role | aut |
author_sort | Martin, Keith M. |
author_variant | k m m km kmm |
building | Verbundindex |
bvnumber | BV049941487 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1492111117 (DE-599)BVBBV049941487 |
discipline | Informatik |
edition | Norton paperback |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049941487</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241217</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">241107s2021 xx b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780393867459</subfield><subfield code="9">978-0-393-86745-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1492111117</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049941487</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Martin, Keith M.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1020725265</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography</subfield><subfield code="b">the key to digital security, how it works, and why it matters</subfield><subfield code="c">Keith Martin</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Norton paperback</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">W. W. Norton & Company</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">309 Seiten</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our car doors with electronic key fobs. Broadly defined as a set of tools for establishing the basic elements of security in cyberspace, cryptography enables us to keep secrets and determine who we are talking to, as well as to detect changes to information. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, and bitcoin transactions-in short, everything we do online. Yet, while we all rely crucially on encryption technology for our personal security, it is not without controversy. By preventing access to information in cyberspace, cryptography can hamper criminal investigations and obstruct national security efforts, and when deployed with ransomware it can even be used as a means of attacking computers. In this book, information security expert Keith Martin illuminates the many functions of cryptography and how we use it, leaving readers with a profound perspective on their own personal security"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="775" ind1="0" ind2="8"><subfield code="i">Äquivalent</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-324-00429-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-1-324-00430-1</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035279709</subfield></datafield></record></collection> |
id | DE-604.BV049941487 |
illustrated | Not Illustrated |
indexdate | 2025-02-10T11:05:02Z |
institution | BVB |
isbn | 9780393867459 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035279709 |
oclc_num | 1492111117 |
open_access_boolean | |
owner | DE-703 |
owner_facet | DE-703 |
physical | 309 Seiten 24 cm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | W. W. Norton & Company |
record_format | marc |
spelling | Martin, Keith M. Verfasser (DE-588)1020725265 aut Cryptography the key to digital security, how it works, and why it matters Keith Martin Norton paperback New York, NY W. W. Norton & Company 2021 309 Seiten 24 cm txt rdacontent n rdamedia nc rdacarrier "A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our car doors with electronic key fobs. Broadly defined as a set of tools for establishing the basic elements of security in cyberspace, cryptography enables us to keep secrets and determine who we are talking to, as well as to detect changes to information. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, and bitcoin transactions-in short, everything we do online. Yet, while we all rely crucially on encryption technology for our personal security, it is not without controversy. By preventing access to information in cyberspace, cryptography can hamper criminal investigations and obstruct national security efforts, and when deployed with ransomware it can even be used as a means of attacking computers. In this book, information security expert Keith Martin illuminates the many functions of cryptography and how we use it, leaving readers with a profound perspective on their own personal security"-- Kryptologie (DE-588)4033329-2 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Data encryption (Computer science) Cryptography Kryptologie (DE-588)4033329-2 s Chiffrierung (DE-588)4352893-4 s DE-604 Äquivalent Druck-Ausgabe, Hardcover 978-1-324-00429-5 Erscheint auch als Online-Ausgabe, EPUB 978-1-324-00430-1 |
spellingShingle | Martin, Keith M. Cryptography the key to digital security, how it works, and why it matters Kryptologie (DE-588)4033329-2 gnd Chiffrierung (DE-588)4352893-4 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4352893-4 |
title | Cryptography the key to digital security, how it works, and why it matters |
title_auth | Cryptography the key to digital security, how it works, and why it matters |
title_exact_search | Cryptography the key to digital security, how it works, and why it matters |
title_full | Cryptography the key to digital security, how it works, and why it matters Keith Martin |
title_fullStr | Cryptography the key to digital security, how it works, and why it matters Keith Martin |
title_full_unstemmed | Cryptography the key to digital security, how it works, and why it matters Keith Martin |
title_short | Cryptography |
title_sort | cryptography the key to digital security how it works and why it matters |
title_sub | the key to digital security, how it works, and why it matters |
topic | Kryptologie (DE-588)4033329-2 gnd Chiffrierung (DE-588)4352893-4 gnd |
topic_facet | Kryptologie Chiffrierung |
work_keys_str_mv | AT martinkeithm cryptographythekeytodigitalsecurityhowitworksandwhyitmatters |