Faça download dos Aplicativos de Leitura Kindle Gratuitos e comece a ler eBooks Kindle nos mais populares smartphones, tablets e computadores pessoais. Para enviar o link de download para seu smartphone por SMS, use o formato internacional sem espaços (Código Internacional+DDD+Número. Exemplo: +551199999999)

  • Apple
  • Android
  • Windows Phone
  • Android

Para receber o link de download digite seu celular:

Preço Kindle: R$ 118,48

Economize
R$ 77,44 (40%)

OU

Essas promoções serão aplicadas a este item:

Algumas promoções podem ser combinadas; outras não são elegíveis. Para detalhes, por favor, acesse os Termos e Condições dessas promoções.

Entregar no seu Kindle ou em outro dispositivo

Entregar no seu Kindle ou em outro dispositivo

Anúncio do aplicativo do Kindle

Cryptography Engineering: Design Principles and Practical Applications 1 , eBook Kindle


Ver todos os 2 formatos e edições Ocultar outros formatos e edições
Preço
Novo a partir de Usado a partir de
eBook Kindle
"Tente novamente"
R$ 118,48

Número de páginas: 386 páginas Configuração de fonte: Habilitado Page Flip: Habilitado
Idioma: Inglês

Novidades da Loja Kindle
Novidades da Loja Kindle
eBooks novos para sua biblioteca digital. Veja aqui

Descrições do Produto

Descrição do produto

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.

After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.

  • An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography
  • Shows you how to build cryptography into products from the start
  • Examines updates and changes to cryptography
  • Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more

Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

Contracapa

Learn to build cryptographic protocols that work in the real world

Knowing how a camera works does not make you a great photographer. Knowing what cryptographic designs are and how existing cryptographic protocols work does not give you proficiency in using cryptography. You must learn to think like a cryptographer.

That is what this book will teach you. Dive deeply into specific, concrete cryptographic protocols and learn why certain decisions were made. Recognize the challenges and how to overcome them. With this book, which is suitable for both classroom and self-study, you will learn to use cryptography effectively in real-world systems.

  • Understand what goes into designing cryptographic protocols

  • Develop an understanding of the interface between cryptography and the surrounding system, including people, economics, hardware, software, ethics, policy, and other aspects of the real world

  • Look beyond the security protocol to see weaknesses in the surrounding system

  • Thwart the adversary by understanding how adversaries think

  • Learn how to build cryptography into new products


Detalhes do produto

  • Formato: eBook Kindle
  • Tamanho do arquivo: 2191 KB
  • Número de páginas: 386 páginas
  • Editora: Wiley; Edição: 1 (2 de fevereiro de 2011)
  • Vendido por: Amazon Servicos de Varejo do Brasil Ltda
  • Idioma: Inglês
  • ASIN: B004NSW9JU
  • Leitura de texto: Habilitado
  • X-Ray:
  • Dicas de vocabulário: Não habilitado
  • Leitor de tela: Compatível
  • Configuração de fonte: Habilitado
  • Avaliação média: Seja o primeiro a avaliar este item
  • Lista de mais vendidos da Amazon: #111,914 entre os mais vendidos na Loja Kindle (Conheça os 100 mais vendidos na Loja Kindle)

Avaliação de clientes

Ainda não há avaliações de clientes para este título na Amazon.com.br
5 estrelas
4 estrelas
3 estrelas
2 estrelas
1 estrela

Avaliações mais úteis de consumidores na Amazon.com (beta) (Pode incluir avaliações do Programa de Recompensas para Primeiros Avaliadores)

Amazon.com: 4.6 de 5 estrelas 40 avaliações
Esta avaliação foi considerada útil por 80 de 81 pessoa(s):
5.0 de 5 estrelas Long awaited update of the Practical Cryptography 12 de março de 2010
Por Mihailo Despotovic - Publicada na Amazon.com
Formato: Capa comum Compra verificada
I just got the book, skimmed over it and compared it with the 1st edition (Practical Cryptography).

First of all, if you don't have the 1st edition, this is an excellent buy. It's a "middle ground" book and probably the one you should start with if you are interested in practical cryptography. Then, depending on your interests and needs, you could proceed to a technically and mathematically much deeper (but somewhat obsolete) Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition or to some other direction using the foundation laid down in this book and then getting other book(s) about "hard-core" mathematics of cryptography or about "softer" methods of social engineering and real-life security.

I will now assume you know what the book is all about and that you are considering upgrading it so here are some quick things I hope to help you deciding:

- first of all, obviously, the errata from the 1st edition is incorporated into the text (there is no errata for the 2nd edition yet but keep checking on the book's home page [ [..] ]) which also contains the links from the book so you don't have to type them yourself while investigating
- the algorithms, protocols and formulas look the same but they might have minor tweaks, most of the stuff I looked up is the same as in the 1st edition
- the 2nd edition has 60 pages less and that's because the line spacing is smaller (the text is more dense) and not because some material has been omitted (at least I could not find anything significant being removed)
- one (really small) speculative mathematical subchapter has been removed (4.5.6 in 1st edition: Equation Solving Attacks); I guess the attack/math did not turn out to work
- the new addition to the team of the authors is a university professor and, as a result of that, the book has more of a textbook feel: exercises at the end of each chapter are added and the preface now contains example syllabi subchapter with three course proposals (6, 10 and 12 week) based on the book; it is also mentioned in the preface that the book is now "more suited for a self-study"
- the chapter layout is exactly the same as in 1st edition but off by one since "Our Design Philosophy" from the 1st edition has been presented a bit later as a subchapter of another chapter
- there are more references at the end (130 vs 97)
- minor: the cover is more boring, it really looks and, with the denser text inside, feels like a textbook while the 1st edition looked more like an engineering/hacking book

These are my very first quick and most likely incomplete and biased impressions, I might come back and update the review if I find anything significant.
Esta avaliação foi considerada útil por 4 de 4 pessoa(s):
5.0 de 5 estrelas Great For Best-Practice Recommendations 28 de novembro de 2015
Por Maggie Essington - Publicada na Amazon.com
Formato: Capa comum Compra verificada
Most books focus on the mathematics behind cryptography. While really cool (and important to know if you plan on fooling with cryptography), those books tend to leave you a little lost in terms of recommendations on how to properly use cryptography in your own applications. This book covers the gap pretty well, I believe; it was an enjoyable read, with enough theory to be interesting but mostly lots of discussion on real use cases. I would recommend this book to anyone new-ish to cryptography that wants recommendations on which crypto algorithms or methods to use. If you want deeper understanding of how it works, you'd probably want to pick a different book to supplement however.
5.0 de 5 estrelas Pragmatic Guide To Cryptography Engineering 30 de janeiro de 2017
Por William P Ross - Publicada na Amazon.com
Formato: Capa comum Compra verificada
Cryptography Engineering discusses building cryptographic systems from the ground up. The focus is on the engineering and security aspect, rather than the theoretical or mathematical. While the book is highly technical in some places, the writing was thoughtful and easy to understand.

Part One of the book looks at the building blocks of cryptography and security. Block ciphers, hashing, and authentication are covered in depth. Possible attack scenarios are covered as well. The book does an excellent job looking at how to build a secure system and how malicious actors can try and bypass the security.

Common examples uses Alice and Bob in diagrams, and 'Eve' is used to represent eavesdroppers or attackers. The diagrams helped me a lot in understanding some situations.

The mid-sections of the book examine some exisiting cryptographic protocols. The focus in on how they are engineered. While there is some math, the more complex math is left as a reference. I thought this was a good decision by the authors so that the book remained readable and did not get lost in theory.

There is an extensive section on Public Key Infrastructure and managing secret keys. The authors tended to focus more on security concerns in this area.

Generally the book does a great job discussing cryptography and security. The three authors are clearly experts and convey their experience in a single voice throughout the book. If you are looking to build a system with cryptography, definitely get this book.
Esta avaliação foi considerada útil por 2 de 2 pessoa(s):
5.0 de 5 estrelas Great book for engineers 24 de dezembro de 2015
Por Chris - Publicada na Amazon.com
Formato: Capa comum Compra verificada
If you are an engineer, and deal with data transfer or in that general field, I would suggest this book. It is very well written, and I notice it's not targeted specially toward someone majoring in cryptography, but also captures the engineering audience. Very good read. Another pro is the authors display their experience by presenting real world scenerios.
Esta avaliação foi considerada útil por 1 de 1 pessoa(s):
5.0 de 5 estrelas Great book! Buy it! 25 de julho de 2015
Por Kevin Riggs - Publicada na Amazon.com
Formato: eBook Kindle Compra verificada
Outstanding book on this topic. Recent publication (as of this writing). Great background on advanced topics from leading public minds.

I highly recommend this as a basis for a practical understanding if you missed these topics in school. I cannot imagine a better treatment of cryptography engineering.

Includes chapters that delve into the details of the foundational mathematical framework for current cryptography.
click to open popover