Will your organization be protected the day a quantum computer breaks encryption on the internet?
Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ‘crackers’ to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today’s computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day―HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication―will be virtually useless. . . unless you prepare.
Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book:
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Roger A. Grimes has worked in computer security for over 30 years, specializing in host and network protection, including cryptographic systems. As a professional penetration tester, he successfully broke into every company he was hired to hack into within an hour, with a single exception that took three hours. He has been the computer security columnist for InfoWorld and CSOOnline magazines since 2005. As evangelist for KnowBe4, the world's largest security awareness training vendor, Roger speaks at major security industry events worldwide.
Be protected the day quantum computing breaks encryption
Soon, if it hasn't happened already, someone with a quantum computer will break the encryption that secures passwords, user accounts, data, financial transactions, and every other aspect of digital life. Many of the current cryptographic methods, including HTTPS, TLS, WiFi protection, VPNs, and cryptocurrencies, will be rendered obsolete in an instant. In 2016, the National Institutes of Standards and Technology (NIST) said that all organizations should start preparing NOW for the coming quantum cryptographic break. Security professionals must heed that advice to prepare their organizations for the quantum computing security threat today.
Cryptography Apocalypse is an indispensable resource for every IT and InfoSec professional responsible for making appropriate decisions to meet the challenges of the coming quantum-computing revolution. Post-quantum crypto algorithms currently exist, but implementation will take time and more computing power. This invaluable guide provides real-world advice on where to best use current crypto technologies, explores how and when quantum computing will break existing crypto, and examines which applications are most likely to be broken in the near future. Written for anyone in the InfoSec world who needs to know if their security is ready for the day crypto breaks--and how to fix it--this must-have guide will help you:
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerEUR 5,71 für den Versand von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & DauerAnbieter: medimops, Berlin, Deutschland
Zustand: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. Artikel-Nr. M01119618193-V
Anzahl: 1 verfügbar
Anbieter: Speedyhen, London, Vereinigtes Königreich
Zustand: NEW. Artikel-Nr. NW9781119618195
Anzahl: 3 verfügbar
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Artikel-Nr. FW-9781119618195
Anzahl: 15 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Artikel-Nr. 53378764-6
Anzahl: 1 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9781119618195_new
Anzahl: Mehr als 20 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Über den AutorRoger A. Grimes has worked in computer security for over 30 years, specializing in host and network protection, including cryptographic systems. As a professional penetration tester, he successfully broke int. Artikel-Nr. 284803114
Anzahl: 3 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - Be protected the day quantum computing breaks encryption. Artikel-Nr. 9781119618195
Anzahl: 2 verfügbar
Anbieter: Kennys Bookstore, Olney, MD, USA
Zustand: New. 2019. 1st Edition. Paperback. . . . . . Books ship from the US and Ireland. Artikel-Nr. V9781119618195
Anzahl: 3 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. pp. 272. Artikel-Nr. 380003309
Anzahl: 3 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 248 pages. 9.00x7.25x0.50 inches. In Stock. Artikel-Nr. __1119618193
Anzahl: 2 verfügbar