The Manga Guide to Cryptography
暫譯: 漫畫版密碼學指南

Masaaki Mitani, Shinichi Sato, Idero Hinoki, Verte Corp.

  • 出版商: No Starch Press
  • 出版日期: 2018-07-31
  • 售價: $1,110
  • 貴賓價: 9.5$1,055
  • 語言: 英文
  • 頁數: 248
  • 裝訂: Paperback
  • ISBN: 1593277423
  • ISBN-13: 9781593277420
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

相關主題

商品描述

Cryptography is hard, but it’s less hard when it’s filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English.

As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you’ll learn how cryptographic ciphers work. (Ciphers are the algorithms at the heart of cryptography.) Like all books in the Manga Guide series, The Manga Guide to Cryptography is illustrated throughout with memorable Japanese manga as it dives deep into advanced cryptography topics, such as classic substitution, polyalphabetic, and transposition ciphers; symmetric-key algorithms like block and DES (Data Encryption Standard) ciphers; and how to use public key encryption technology. It also explores practical applications of encryption such as digital signatures, password security, and identity fraud countermeasures.

The Manga Guide to Cryptography is the perfect introduction to cryptography for programmers, security professionals, aspiring cryptographers, and anyone who finds cryptography just a little bit hard.

商品描述(中文翻譯)

加密技術很難,但當它與可愛的日本漫畫結合時,就變得不那麼困難了。最新加入《漫畫指南》系列的書籍《漫畫指南:密碼學》將加密和解密的藝術轉化為簡單的漫畫插圖英語。

在你跟隨梅黑郎檢查官(Inspector Jun Meguro)追捕一名使用密碼的竊賊的過程中,你將學習到加密密碼是如何運作的。(密碼是加密技術的核心算法。)像《漫畫指南》系列中的所有書籍一樣,《漫畫指南:密碼學》全書都配有令人難忘的日本漫畫,深入探討高級密碼學主題,如經典的替代密碼、多重字母密碼和置換密碼;對稱密鑰算法,如區塊密碼和 DES(數據加密標準)密碼;以及如何使用公鑰加密技術。它還探討了加密的實際應用,如數位簽名、密碼安全和身份詐騙的對策。

《漫畫指南:密碼學》是程序員、安全專業人士、未來的密碼學家以及任何覺得密碼學有點困難的人的完美入門書籍。

目錄大綱

Prologue
1 The Foundations of Encryption
2 Symmetric-Key Algorithms
3 Public-Key Encryption
Practical Applications of Encryption
What Next?
Epilogue

目錄大綱(中文翻譯)

Prologue

1 The Foundations of Encryption

2 Symmetric-Key Algorithms

3 Public-Key Encryption

Practical Applications of Encryption

What Next?

Epilogue