Processing ......
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
 
Practical Cryptography for Developers
🌠 Top Free Unix/Linux Books - 100% Free or Open Source!
  • Title Practical Cryptography for Developers
  • Author(s) Svetlin Nakov
  • Publisher: Self-Publishing (nakov.com), unglue; eBook (MIT Licensed)
  • License(s): MIT License
  • Hardcover/Paperback N/A
  • eBook HTML, PDF, ePub, and Mobi
  • Language: English
  • ISBN-10: N/A
  • ISBN-13: N/A
  • Share This:  

Book Description

A modern practical book about cryptography for developers with code examples, covering core concepts, along with crypto libraries and developer tools, with a lots of code examples in Python and other languages.

You are a software developer? And sometimes you need to use cryptography in your daily job, like hashes, encryption or digital signatures? And you think cryptography is complex and full of math and it is for nerds only? No, this is not true, every developer can learn how to use cryptographic algorithms. This book will show you how: with code examples and hands-on coding experience, with less math and more practice.

This book is the perfect introduction to cryptography for programmers, security professionals, aspiring cryptographers, and anyone who finds cryptography just a little bit hard.

About the Authors
  • Svetlin Nakov has 20+ years of technical background as software engineer, project manager, consultant, trainer, and digital entrepreneur with rich technical experience (blockchain, Web development, information systems, databases, cryptography, C#, Java, JS, PHP, Python).
Reviews, Ratings, and Recommendations: Related Book Categories: Read and Download Links: Similar Books:
  • Handbook of Applied Cryptography (Alfred J. Menezes, et al)

    This book is an incredible achievement. If you want to check what problems there were with a proposed system, determine how the variations on a particular algorithm developed, see what research preceded and followed an idea, go to the Handbook.

  • The Joy of Cryptography (Mike Rosulek)

    The definitive introduction to all major areas of cryptography: message security, key negotiation, and key management, but in a way that is more accessible than what is "traditional" in crypto. All security definitions are written in a "game-based" style.

  • Cryptography: An Introduction, 3rd Edition (Nigel Smart)

    This book provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.

  • A Graduate Course in Applied Cryptography (Dan Boneh, et al)

    This book is about mathematical modeling and proofs to show that a particular cryptosystem satisfies the security properties attributed to it: constructing practical cryptosystems for which we can argue security under plausible assumptions.

  • Modern Cryptography Volume 1: A Classical Introduction

    This book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical principles behind various encryption and decryption algorithms.

  • Modern Cryptography Volume 2: Post-Quantum Cryptography

    This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers.

  • Fundamentals of Cryptology: A Professional Reference (H. Tilborg)

    This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.

  • Introduction to Modern Cryptography (Mihir Bellare, et al.)

    This book introduces the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. It also presents design principles for widely used stream ciphers and block ciphers.

Book Categories
:
Other Categories
Resources and Links