Unitevi a noi al Binding Hook Live il 27 ottobre all'Underbelly Boulevard Soho di Londra.
Unitevi a noi al Binding Hook Live

Crittografia

This module explores cryptography, focusing on the techniques used to secure communication through encryption. It covers key concepts such as symmetric and asymmetric encryption, cryptographic protocols, and the application of cryptography in securing data.

Costruttore di programmi di studio

Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. 1st ed. CRC Press, 2018.

https://doi.org/10.1201/9780429466335

Stransky, Christian, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, and Sascha Fahl. “On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.” In Proceedings of the Seventeenth USENIX Conference on Usable Privacy and Security, 437–54. SOUPS’21. USA: USENIX Association, 2021.

Katz, Jonathan, and Yehuda Lindell. Introduction to Modern Cryptography. 2nd ed. Chapman & Hall/Crc Cryptography and Network Security Series. Boca Raton: CRC Press/Taylor & Francis, 2015.

Adams, Carlisle, and Steve Lloyd. Understanding PKI: Concepts, Standards, and Deployment Considerations. 2nd ed. Boston: Addison-Wesley, 2003.

Stinson, Douglas R., and Maura B. Paterson. Cryptography: Theory and Practice. 4th ed. Boca Raton: CRC Press, Taylor & Francis Group, 2019.

Stallings, William. Cryptography and network security: principles and practice. 7th ed. Uttar Pradesh, India: Pearson, 2022.

Alexander, David, Amanda Finch, and David Sutton. Information Security Management Principles. Edited by Andy Taylor. Second edition. Swindon, UK: BCS, the Chartered Institute for IT, 2013.

Hopkin, Paul. Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management. 5th Edition. London ; New York: Kogan Page, 2018.

Kaufman, Charlie, Radia Perlman e Michael Speciner. Sicurezza della rete: Comunicazione privata in un mondo pubblico. 2a ed. Prentice Hall Series in Computer Networking and Distributed Systems. Upper Saddle River, NJ: Prentice Hall PTR, 2002.

Grazie per esserti iscritto alla nostra newsletter!

Thank you! RSVP received for Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. 1st ed. CRC Press, 2018.

Grazie per aver fatto domanda! Ci metteremo in contatto con voi.

Apply for: Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. 1st ed. CRC Press, 2018.

Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. 1st ed. CRC Press, 2018.

Caricamento...

Caricamento...