Though often invisible, cryptography plays a critical role in our everyday lives. Broadly defined as a set of tools for establishing security in cyberspace, cryptography enables us to protect our information and share it securely. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, Bitcoin transactionsin short, everything we do online.
Clearly and concisely, Keith Martin reveals the many crucial ways we all rely on cryptographic technology and demystifies its controversial applications and the nuances behind alarming headlines about data breaches or Edward Snowden. Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.
Though often invisible, cryptography plays a critical role in our everyday lives. Broadly defined as a set of tools for establishing security in cyberspace, cryptography enables us to protect our information and share it securely. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, Bitcoin transactionsin short, everything we do online.
Clearly and concisely, Keith Martin reveals the many crucial ways we all rely on cryptographic technology and demystifies its controversial applications and the nuances behind alarming headlines about data breaches or Edward Snowden. Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.
Note: The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
Note
The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
People who bought this also bought
[{"item_id":"9082","item_name":"Handbook of Applied Cryptography - Discrete Mathematics and Its Applications","item_brand":"Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone","item_category":"Computing & Internet","list":"Product Page","price":"88.39","variant":"","quantity":1},{"item_id":"9311","item_name":"Everyday Cryptography: Fundamental Principles and Applications","item_brand":"Keith Martin","item_category":"Computing & Internet","list":"Product Page","price":"40.60","variant":"","quantity":1},{"item_id":"9809","item_name":"Cryptography For Dummies","item_brand":"Chey Cobb","item_category":"Computing & Internet","list":"Product Page","price":"7.06","variant":"","quantity":1},{"item_id":"9973","item_name":"Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto","item_brand":"Roger A. Grimes","item_category":"Computing & Internet","list":"Product Page","price":"13.96","variant":"","quantity":1},{"item_id":"10599","item_name":"SSL\/TLS Under Lock and Key: A Guide to Understanding SSL\/TLS Cryptography","item_brand":"Hollie Acres, Paul Baka, Jeremy Schatten","item_category":"Computing & Internet","list":"Product Page","price":"10.12","variant":"","quantity":1},{"item_id":"10959","item_name":"Cryptography InfoSec Pro Guide","item_brand":"Sean-Philip Oriyano","item_category":"Computing & Internet","list":"Product Page","price":"9.29","variant":"","quantity":1},{"item_id":"13018","item_name":"Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings - Security and Cryptology 6061","item_brand":"Nicolas Sendrier","item_category":"Computing & Internet","list":"Product Page","price":"31.49","variant":"","quantity":1},{"item_id":"16287","item_name":"Bitcoin: Everything You Need to Know About Bitcoin","item_brand":"Corey Bowen","item_category":"Language & Reference","list":"Product Page","price":"14.69","variant":"","quantity":1}]