Kryptografia - ebooki
Ebooki z kategorii: Kryptografia dostępne w księgarni Helion
-
Podstawy kryptografii. Wydanie III
-
Mała księga wielkich szyfrów
-
Blockchain. Przewodnik po łańcuchu bloków - od kryptografii po DeFi i NFT. Wydanie IV
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone
-
Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym
-
Bitcoin. Ilustrowany przewodnik
-
Dowód stawki. Proof of stake (PoS), powstanie Ethereum i filozofia łańcucha bloków
-
Prawdziwy świat kryptografii
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Algorytmy kryptograficzne w Pythonie. Wprowadzenie
-
ISO 27001/ISO 27002. A guide to information security management systems
-
Praktyczna inżynieria wsteczna. Metody, techniki i narzędzia
-
ISO 27001 Controls. Mastering ISO 27001: A Step-by-Step Guide to Effective Implementation and Auditing
-
Krótki kurs. Kryptografia
-
Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków
-
Mastering Ethereum. 2nd Edition
-
SZYFROWANIE BEZPIECZEŃSTWO KRYPTOGRAFIA: CZĘŚĆ 1 Podstawowe pojęcia i koncepcje
-
PDF
-
-
Spring Security. Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Fourth Edition
-
Ethical Hacker's Certification Guide (CEHv11)
-
Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity
-
Ghidra Software Reverse-Engineering for Beginners. Master the art of debugging, from understanding code to mitigating threats - Second Edition
-
Information Security Risk Management for ISO 27001/ISO 27002. A Practical Guide to Risk, Assessment, and Control Selection Aligned with ISO Standards
-
Discrete Mathematics With Cryptographic Applications. A Self-Teaching Guide to Unlocking the Power of Advanced Concepts and Computational Techniques
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Data Science for Malware Analysis. A comprehensive guide to using AI in detection, analysis, and compliance
-
Blockchain From Concept to Execution (2nd Edition)
-
Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II
-
Anonimizacja i maskowanie danych wrażliwych w przedsiębiorstwach
-
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
-
PCI DSS Version 4.0.1. A guide to the payment card industry data security standard
-
EU General Data Protection Regulation (GDPR). An implementation and compliance guide
-
Blockchain QuickStart Guide
-
Kryptografia. W teorii i praktyce
-
AI-Native LLM Security. Threats, defenses, and best practices for building safe and trustworthy AI
-
The Azure Cloud Native Architecture Mapbook. Design and build Azure architectures for infrastructure, applications, data, AI, and security - Second Edition
-
Mastering Endpoint Management using Microsoft Intune Suite. Learn Everything About Intune Suite
-
A Day in the Life of a CISO. Personal Mentorship from 24+ Battle-Tested CISOs — Mentoring We Never Got
-
Certified Penetration Testing Professional (CPENT) Exam Guide
-
The Art of Cyber Security. A practical guide to winning the war on cyber crime
-
The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework
-
Disaster Recovery and Business Continuity. A quick guide for organisations and business managers
-
The Ransomware Threat Landscape. Prepare for, recognise and survive ransomware attacks
-
Digital Ethics in the Age of AI. Navigating the ethical frontier today and beyond
-
The Security Consultant's Handbook. Essential Strategies for Building and Managing a Security Consulting Business
-
Cyber Essentials. A guide to the Cyber Essentials and Cyber Essentials Plus certifications
-
Cyber Resilience. A Comprehensive Guide to Understanding and Implementing Cybersecurity Principles
-
Securing Cloud Services. A Comprehensive Approach to Safeguarding Cloud Infrastructure, Services, and Data
-
The California Privacy Rights Act (CPRA). An implementation and compliance guide
-
Hands-on Penetration Testing for Web Applications - 2nd Edition
-
Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
Mastering Zero-knowledge Proofs
-
Blockchain, Bitcoin, and the Digital Economy. Unlocking the Future of Financial Technology
-
Docker Deep Dive. Zero to Docker in a single book - Third Edition
-
Cracking the Cybersecurity Interview
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Rust for Blockchain Application Development. Learn to build decentralized applications on popular blockchain technologies using Rust
-
Building Full Stack DeFi Applications. A practical guide to creating your own decentralized finance projects on blockchain
-
The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition
-
Breaking Ransomware
-
Building NFTs with Ethereum
-
Penetration Testing for Jobseekers
-
Exploring Blockchain in Healthcare
-
Cryptography and Network Security
-
Hands-On Smart Contract Development with Hyperledger Fabric V2
-
Cloud Computing Simplified
-
Hands-on Penetration Testing for Web Applications
-
Zbiór zadań z podstaw teoretycznych kryptografii i ochrony informacji
-
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
-
Mastering Blockchain
-
Blockchain Success Stories
-
Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition
-
Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies
-
Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain
-
Blockchain Development for Finance Projects. Building next-generation financial applications using Ethereum, Hyperledger Fabric, and Stellar
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business
-
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity
-
Unblocked. How Blockchains Will Change Your Business (and What to Do About It)
-
Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
-
Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python
-
Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications
-
Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications
-
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
Ripple and Stablecoins : Building Banks of Tomorrow
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
-
The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems
-
Zastosowania technologii Blockchain
-
Blockchain across Oracle. Understand the details and implications of the Blockchain for Oracle developers and customers
-
Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens
-
Blockchain for Enterprise. Build scalable blockchain applications with privacy, interoperability, and permissioned features
-
Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
-
Learn Bitcoin and Blockchain. Understanding blockchain and Bitcoin architecture to build decentralized applications
-
Hands-On Bitcoin Programming with Python. Build powerful online payment centric applications with Python
-
Blockchain Quick Reference. A guide to exploring decentralized blockchain application development
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
Solidity Programming Essentials. A beginner's guide to build smart contracts for Ethereum and blockchain
-
Fundamentals of Cyber Security
-
Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition
-
Ethereum Smart Contract Development. Build blockchain-based decentralized applications using solidity
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks
-
Java Cryptography
-
Secure Programming Cookbook for C and C++. Recipes for Cryptography, Authentication, Input Validation & More
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Blockchain. Podstawy technologii łańcucha bloków w 25 krokach
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Złam ten kod z Pythonem. Jak tworzyć, testować i łamać szyfry
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
Najczęściej zadawane pytania (FAQ)
1. Czym jest kryptografia?
Kryptografia to dziedzina nauki zajmująca się zabezpieczaniem informacji przed nieautoryzowanym dostępem. Obejmuje zarówno tradycyjne metody szyfrowania wiadomości, jak i nowoczesne technologie ochrony danych w cyfrowym świecie. Dzięki kryptografii możemy bezpiecznie przesyłać dane, chronić prywatność oraz zabezpieczać transakcje w sieci.
2. Jakie zagadnienia obejmują książki o kryptografii?
Publikacje z Helion obejmują szeroki zakres tematów, od podstawowych technik szyfrowania po zaawansowane algorytmy, takie jak symetryczny szyfr blokowy DES czy asymetryczny RSA. Książki wyjaśniają również działanie protokołów PGP, SSL, SSH, podpisu elektronicznego oraz implementację algorytmów kryptograficznych w różnych językach programowania, np. PHP.
3. Dla kogo są przeznaczone książki o kryptografii?
Książki z Helion są adresowane zarówno do początkujących, którzy chcą poznać podstawy szyfrowania i mechanizmy bezpieczeństwa, jak i do zaawansowanych użytkowników zainteresowanych praktycznym stosowaniem algorytmów kryptograficznych w realnych projektach.

