Cryptography Basics & Practical Usage (IWC Labs Attack Book 1)

Автор: literator от 1-11-2020, 12:16, Коментариев: 0

Категория: КНИГИ » ПРОГРАММИРОВАНИЕ

Cryptography Basics & Practical Usage (IWC Labs Attack Book 1)Название: Cryptography Basics & Practical Usage
Автор: Jeremy Martin, Richard Medlin, Nitin Sharma et al.
Издательство: Information Warfare Center
Год: 2020
Страниц: 163
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Do you want to learn more about encryption with hands on labs for implementing cryptography? Do you want to learn about hacking password, hashes, and files? Are you studying for a cybersecurity certification and want to make sure you pass the "crypto" section of the test? Then, this book is for you.

This book was designed to cover the basic coverage on commonly used encryption and encryption attacks along with some hands-on labs. Get a baseline understanding on encryption that used in our everyday lives in enterprise, government, and personal environments. With practical usage example, you can practice what you are reading.

Cryptography is a way of using advanced mathematical concepts to encrypt and transmit data in a specific form such that it can only be interpreted and accessed by those it is meant for. Encryption is a core cryptographic principle–it is a mechanism by which a document is stored in a way that when a hacker is eavesdropping, he cannot read or understand. The technique is ancient, and Caesar used it to encrypt his letters using Caesar’s cipher for the first time. A user’s Plaintext can be converted into a ciphertext, then sent through a channel of communication, and no eavesdropper can mess with Plaintext. When it reaches the end of the receiver the ciphertext is decrypted to the original Plaintext.

Algorithms: Essentially, an algorithm basically is a method or mechanism for solving a data eavesdropping problem. An encryption algorithm is a set of mathematical procedures to encrypt data. An encryption algorithm is a series of data encryption mathematical procedures. Upon using the algorithm, a series of complex mathematical calulations is made in order to transform readable information into a cipher text or text that looks gibberish in human language. However, this gibberish can be returned back to its original form using a special key. It takes us to the idea of cryptography used in communication systems for a long time in information security.

This book is also a great supplemental guide if you are studying for the following cybersecurity certifications:

•Network+
•Security+
•CySA+
•SSCP
•CAP
•CISSP
•CISM
•CEH
•and other similar credentials.

Скачать Cryptography Basics & Practical Usage (IWC Labs Attack Book 1)








Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.