Modern cryptography for cybersecurity professionals :: learn how you can leverage encryption to better secure your organization's data /
As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at restCompare symmetric with asymmetric encryption...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2021.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at restCompare symmetric with asymmetric encryption and learn how a hash is usedGet to grips with different types of cryptographic solutions along with common applicationsBook DescriptionIn today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. You'll then delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN).By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption and hashed are used, and recognized the importance of key management and the PKI.What you will learnUnderstand how network attacks can compromise dataReview practical uses of cryptography over timeCompare how symmetric and asymmetric encryption workExplore how a hash can ensure data integrity and authenticationUnderstand the laws that govern the need to secure dataDiscover the practical applications of cryptographic techniquesFind out how the PKI enables trustGet to grips with how data can be secured using a VPNWho this book is forThis book is for IT managers, security professionals, students, teachers, and anyone looking to learn more about cryptography and understand why it is important in an organization as part of an overall security framework. A basic understanding of encryption and general networking terms and concepts is needed to get the most out of this book. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (287 pages) |
ISBN: | 9781838647797 1838647791 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1255227244 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 210605s2021 enk o 001 0 eng d | ||
040 | |a EBLCP |b eng |e rda |c EBLCP |d UKMGB |d OCLCO |d OCLCF |d N$T |d OCLCO |d YDX |d OCLCQ |d CPV |d IEEEE |d OCLCO |d OCLCL |d TMA |d OCLCQ | ||
015 | |a GBC177924 |2 bnb | ||
016 | 7 | |a 020196407 |2 Uk | |
020 | |a 9781838647797 |q (electronic book) | ||
020 | |a 1838647791 |q (electronic book) | ||
020 | |z 9781838644352 |q (paperback) | ||
035 | |a (OCoLC)1255227244 | ||
037 | |a 9781838647797 |b Packt Publishing Pvt. Ltd | ||
037 | |a 10162282 |b IEEE | ||
050 | 4 | |a QA76.9.A25 |b B63 2021 | |
082 | 7 | |a 005.824 |2 23/eng/20221110 | |
049 | |a MAIN | ||
100 | 1 | |a Bock, Lisa, |e author. | |
245 | 1 | 0 | |a Modern cryptography for cybersecurity professionals : |b learn how you can leverage encryption to better secure your organization's data / |c Lisa Bock. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2021. | |
300 | |a 1 online resource (287 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Includes index. | ||
520 | |a As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at restCompare symmetric with asymmetric encryption and learn how a hash is usedGet to grips with different types of cryptographic solutions along with common applicationsBook DescriptionIn today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. You'll then delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN).By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption and hashed are used, and recognized the importance of key management and the PKI.What you will learnUnderstand how network attacks can compromise dataReview practical uses of cryptography over timeCompare how symmetric and asymmetric encryption workExplore how a hash can ensure data integrity and authenticationUnderstand the laws that govern the need to secure dataDiscover the practical applications of cryptographic techniquesFind out how the PKI enables trustGet to grips with how data can be secured using a VPNWho this book is forThis book is for IT managers, security professionals, students, teachers, and anyone looking to learn more about cryptography and understand why it is important in an organization as part of an overall security framework. A basic understanding of encryption and general networking terms and concepts is needed to get the most out of this book. | ||
505 | 0 | |a Table of Contents Protecting Data in Motion or at Rest The Evolution of Ciphers Evaluating Network Attacks Introducing Symmetric Encryption Dissecting Asymmetric Encryption Examining Hash Algorithms Adhering to Standards Using a Public Key Infrastructure Exploring IPsec and TLS Protecting Cryptographic Techniques. | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 0 | |a Cryptography. |0 http://id.loc.gov/authorities/subjects/sh85034453 | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 6 | |a Cryptographie. | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
758 | |i has work: |a Modern Cryptography for Cybersecurity Professionals (Text) |1 https://id.oclc.org/worldcat/entity/E39PCXMhtcxB7QFhdgJmMxf8YP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Bock, Lisa |t Modern Cryptography for Cybersecurity Professionals |d Birmingham : Packt Publishing, Limited,c2021 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2930984 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2930984 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL6631539 | ||
938 | |a EBSCOhost |b EBSC |n 2930984 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1255227244 |
---|---|
_version_ | 1829095355136868352 |
adam_text | |
any_adam_object | |
author | Bock, Lisa |
author_facet | Bock, Lisa |
author_role | aut |
author_sort | Bock, Lisa |
author_variant | l b lb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 B63 2021 |
callnumber-search | QA76.9.A25 B63 2021 |
callnumber-sort | QA 276.9 A25 B63 42021 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Table of Contents Protecting Data in Motion or at Rest The Evolution of Ciphers Evaluating Network Attacks Introducing Symmetric Encryption Dissecting Asymmetric Encryption Examining Hash Algorithms Adhering to Standards Using a Public Key Infrastructure Exploring IPsec and TLS Protecting Cryptographic Techniques. |
ctrlnum | (OCoLC)1255227244 |
dewey-full | 005.824 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.824 |
dewey-search | 005.824 |
dewey-sort | 15.824 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05020cam a2200505 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1255227244</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">210605s2021 enk o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">EBLCP</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CPV</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC177924</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">020196407</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838647797</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1838647791</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781838644352</subfield><subfield code="q">(paperback)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1255227244</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781838647797</subfield><subfield code="b">Packt Publishing Pvt. Ltd</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">10162282</subfield><subfield code="b">IEEE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">B63 2021</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.824</subfield><subfield code="2">23/eng/20221110</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bock, Lisa,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Modern cryptography for cybersecurity professionals :</subfield><subfield code="b">learn how you can leverage encryption to better secure your organization's data /</subfield><subfield code="c">Lisa Bock.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (287 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at restCompare symmetric with asymmetric encryption and learn how a hash is usedGet to grips with different types of cryptographic solutions along with common applicationsBook DescriptionIn today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. You'll then delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN).By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption and hashed are used, and recognized the importance of key management and the PKI.What you will learnUnderstand how network attacks can compromise dataReview practical uses of cryptography over timeCompare how symmetric and asymmetric encryption workExplore how a hash can ensure data integrity and authenticationUnderstand the laws that govern the need to secure dataDiscover the practical applications of cryptographic techniquesFind out how the PKI enables trustGet to grips with how data can be secured using a VPNWho this book is forThis book is for IT managers, security professionals, students, teachers, and anyone looking to learn more about cryptography and understand why it is important in an organization as part of an overall security framework. A basic understanding of encryption and general networking terms and concepts is needed to get the most out of this book.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Table of Contents Protecting Data in Motion or at Rest The Evolution of Ciphers Evaluating Network Attacks Introducing Symmetric Encryption Dissecting Asymmetric Encryption Examining Hash Algorithms Adhering to Standards Using a Public Key Infrastructure Exploring IPsec and TLS Protecting Cryptographic Techniques.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001524</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85034453</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cryptographie.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Modern Cryptography for Cybersecurity Professionals (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCXMhtcxB7QFhdgJmMxf8YP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Bock, Lisa</subfield><subfield code="t">Modern Cryptography for Cybersecurity Professionals</subfield><subfield code="d">Birmingham : Packt Publishing, Limited,c2021</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2930984</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2930984</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6631539</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2930984</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1255227244 |
illustrated | Not Illustrated |
indexdate | 2025-04-11T08:47:42Z |
institution | BVB |
isbn | 9781838647797 1838647791 |
language | English |
oclc_num | 1255227244 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (287 pages) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Bock, Lisa, author. Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better secure your organization's data / Lisa Bock. Birmingham, UK : Packt Publishing, 2021. 1 online resource (287 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes index. As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey FeaturesDiscover how cryptography is used to secure data in motion as well as at restCompare symmetric with asymmetric encryption and learn how a hash is usedGet to grips with different types of cryptographic solutions along with common applicationsBook DescriptionIn today's world, it is important to have confidence in your data storage and transmission strategy. Cryptography can provide you with this confidentiality, integrity, authentication, and non-repudiation. But are you aware of just what exactly is involved in using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals helps you to gain a better understanding of the cryptographic elements necessary to secure your data.The book begins by helping you to understand why we need to secure data and how encryption can provide protection, whether it be in motion or at rest. You'll then delve into symmetric and asymmetric encryption and discover how a hash is used. As you advance, you'll see how the public key infrastructure (PKI) and certificates build trust between parties, so that we can confidently encrypt and exchange data. Finally, you'll explore the practical applications of cryptographic techniques, including passwords, email, and blockchain technology, along with securely transmitting data using a virtual private network (VPN).By the end of this cryptography book, you'll have gained a solid understanding of cryptographic techniques and terms, learned how symmetric and asymmetric encryption and hashed are used, and recognized the importance of key management and the PKI.What you will learnUnderstand how network attacks can compromise dataReview practical uses of cryptography over timeCompare how symmetric and asymmetric encryption workExplore how a hash can ensure data integrity and authenticationUnderstand the laws that govern the need to secure dataDiscover the practical applications of cryptographic techniquesFind out how the PKI enables trustGet to grips with how data can be secured using a VPNWho this book is forThis book is for IT managers, security professionals, students, teachers, and anyone looking to learn more about cryptography and understand why it is important in an organization as part of an overall security framework. A basic understanding of encryption and general networking terms and concepts is needed to get the most out of this book. Table of Contents Protecting Data in Motion or at Rest The Evolution of Ciphers Evaluating Network Attacks Introducing Symmetric Encryption Dissecting Asymmetric Encryption Examining Hash Algorithms Adhering to Standards Using a Public Key Infrastructure Exploring IPsec and TLS Protecting Cryptographic Techniques. Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Cryptography. http://id.loc.gov/authorities/subjects/sh85034453 Chiffrement (Informatique) Cryptographie. Cryptography fast Data encryption (Computer science) fast has work: Modern Cryptography for Cybersecurity Professionals (Text) https://id.oclc.org/worldcat/entity/E39PCXMhtcxB7QFhdgJmMxf8YP https://id.oclc.org/worldcat/ontology/hasWork Print version: Bock, Lisa Modern Cryptography for Cybersecurity Professionals Birmingham : Packt Publishing, Limited,c2021 |
spellingShingle | Bock, Lisa Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better secure your organization's data / Table of Contents Protecting Data in Motion or at Rest The Evolution of Ciphers Evaluating Network Attacks Introducing Symmetric Encryption Dissecting Asymmetric Encryption Examining Hash Algorithms Adhering to Standards Using a Public Key Infrastructure Exploring IPsec and TLS Protecting Cryptographic Techniques. Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Cryptography. http://id.loc.gov/authorities/subjects/sh85034453 Chiffrement (Informatique) Cryptographie. Cryptography fast Data encryption (Computer science) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001524 http://id.loc.gov/authorities/subjects/sh85034453 |
title | Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better secure your organization's data / |
title_auth | Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better secure your organization's data / |
title_exact_search | Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better secure your organization's data / |
title_full | Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better secure your organization's data / Lisa Bock. |
title_fullStr | Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better secure your organization's data / Lisa Bock. |
title_full_unstemmed | Modern cryptography for cybersecurity professionals : learn how you can leverage encryption to better secure your organization's data / Lisa Bock. |
title_short | Modern cryptography for cybersecurity professionals : |
title_sort | modern cryptography for cybersecurity professionals learn how you can leverage encryption to better secure your organization s data |
title_sub | learn how you can leverage encryption to better secure your organization's data / |
topic | Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Cryptography. http://id.loc.gov/authorities/subjects/sh85034453 Chiffrement (Informatique) Cryptographie. Cryptography fast Data encryption (Computer science) fast |
topic_facet | Data encryption (Computer science) Cryptography. Chiffrement (Informatique) Cryptographie. Cryptography |
work_keys_str_mv | AT bocklisa moderncryptographyforcybersecurityprofessionalslearnhowyoucanleverageencryptiontobettersecureyourorganizationsdata |