

Hero image 0 of Real-World Cryptography (Paperback), 0 of 1
Real-World Cryptography (Paperback)
Key item features
An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications.
In Real-World Cryptography, you will find:
Best practices for using cryptography
Diagrams and explanations of cryptographic algorithms
Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem
Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You’ll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the technology
Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations.
About the book
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You’ll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read—and it might just save your bacon the next time you’re targeted by an adversary after your data.
What's inside
Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem
About the reader
For cryptography beginners with no previous experience in the field.
About the author
David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security.
Table of Contents
PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY
1 Introduction
2 Hash functions
3 Message authentication codes
4 Authenticated encryption
5 Key exchanges
6 Asymmetric encryption and hybrid encryption
7 Signatures and zero-knowledge proofs
8 Randomness and secrets
PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY
9 Secure transport
10 End-to-end encryption
11 User authentication
12 Crypto as in cryptocurrency?
13 Hardware cryptography
14 Post-quantum cryptography
15 Is this it? Next-generation cryptography
16 When and where cryptography fails
In Real-World Cryptography, you will find:
Best practices for using cryptography
Diagrams and explanations of cryptographic algorithms
Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem
Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You’ll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the technology
Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations.
About the book
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You’ll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read—and it might just save your bacon the next time you’re targeted by an adversary after your data.
What's inside
Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem
About the reader
For cryptography beginners with no previous experience in the field.
About the author
David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security.
Table of Contents
PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY
1 Introduction
2 Hash functions
3 Message authentication codes
4 Authenticated encryption
5 Key exchanges
6 Asymmetric encryption and hybrid encryption
7 Signatures and zero-knowledge proofs
8 Randomness and secrets
PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY
9 Secure transport
10 End-to-end encryption
11 User authentication
12 Crypto as in cryptocurrency?
13 Hardware cryptography
14 Post-quantum cryptography
15 Is this it? Next-generation cryptography
16 When and where cryptography fails
Specs
- Manual & guide typeInstruction Manual
- Book formatPaperback
- Edition1
- Skill levelBeginner
- Pages400
- LanguageEnglish
Current price is USD$55.99
Price when purchased online
- Free shipping
Free 90-day returns
How do you want your item?
Try 30 days of Free Shipping with Walmart+! Choose plan at checkout.
Columbus, 43215
Arrives by Tue, Apr 14
Sold and shipped by Walmart.com
Free 90-day returns
This item is gift eligible
More seller options (5)
Starting from $55.73
Get free delivery, shipping and more*
*Restrictions apply Try Walmart+ now
About this item
Product details
An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications. In Real-World Cryptography, you will find: Best practices for using cryptography
Diagrams and explanations of cryptographic algorithms
Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You'll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology
Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations. About the book
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There's no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You'll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read--and it might just save your bacon the next time you're targeted by an adversary after your data. What's inside Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem About the reader
For cryptography beginners with no previous experience in the field. About the author
David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security. Table of Contents
PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY
1 Introduction
2 Hash functions
3 Message authentication codes
4 Authenticated encryption
5 Key exchanges
6 Asymmetric encryption and hybrid encryption
7 Signatures and zero-knowledge proofs
8 Randomness and secrets
PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY
9 Secure transport
10 End-to-end encryption
11 User authentication
12 Crypto as in cryptocurrency?
13 Hardware cryptography
Diagrams and explanations of cryptographic algorithms
Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You'll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology
Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations. About the book
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There's no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You'll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read--and it might just save your bacon the next time you're targeted by an adversary after your data. What's inside Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem About the reader
For cryptography beginners with no previous experience in the field. About the author
David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security. Table of Contents
PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY
1 Introduction
2 Hash functions
3 Message authentication codes
4 Authenticated encryption
5 Key exchanges
6 Asymmetric encryption and hybrid encryption
7 Signatures and zero-knowledge proofs
8 Randomness and secrets
PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY
9 Secure transport
10 End-to-end encryption
11 User authentication
12 Crypto as in cryptocurrency?
13 Hardware cryptography
An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications.
In Real-World Cryptography, you will find:
Best practices for using cryptography
Diagrams and explanations of cryptographic algorithms
Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem
Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You’ll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the technology
Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations.
About the book
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You’ll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read—and it might just save your bacon the next time you’re targeted by an adversary after your data.
What's inside
Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem
About the reader
For cryptography beginners with no previous experience in the field.
About the author
David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security.
Table of Contents
PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY
1 Introduction
2 Hash functions
3 Message authentication codes
4 Authenticated encryption
5 Key exchanges
6 Asymmetric encryption and hybrid encryption
7 Signatures and zero-knowledge proofs
8 Randomness and secrets
PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY
9 Secure transport
10 End-to-end encryption
11 User authentication
12 Crypto as in cryptocurrency?
13 Hardware cryptography
14 Post-quantum cryptography
15 Is this it? Next-generation cryptography
16 When and where cryptography fails
In Real-World Cryptography, you will find:
Best practices for using cryptography
Diagrams and explanations of cryptographic algorithms
Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem
Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You’ll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the technology
Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations.
About the book
Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You’ll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read—and it might just save your bacon the next time you’re targeted by an adversary after your data.
What's inside
Implementing digital signatures and zero-knowledge proofs
Specialized hardware for attacks and highly adversarial environments
Identifying and fixing bad practices
Choosing the right cryptographic tool for any problem
About the reader
For cryptography beginners with no previous experience in the field.
About the author
David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security.
Table of Contents
PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY
1 Introduction
2 Hash functions
3 Message authentication codes
4 Authenticated encryption
5 Key exchanges
6 Asymmetric encryption and hybrid encryption
7 Signatures and zero-knowledge proofs
8 Randomness and secrets
PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY
9 Secure transport
10 End-to-end encryption
11 User authentication
12 Crypto as in cryptocurrency?
13 Hardware cryptography
14 Post-quantum cryptography
15 Is this it? Next-generation cryptography
16 When and where cryptography fails
info:
We aim to show you accurate product information. Manufacturers, suppliers and others provide what you see here, and we have not verified it. Â
Specifications
Manual & guide type
Instruction Manual
Book format
Paperback
Edition
1
Skill level
Beginner
Warranty
Warranty information
Please be aware that the warranty terms on items offered for sale by third party Marketplace sellers may differ from those displayed in this section (if any). To confirm warranty terms on an item offered for sale by a third party Marketplace seller, please use the 'Contact seller' feature on the third party Marketplace seller's information page and request the item's warranty terms prior to purchase.
Similar items you might like
Based on what customers bought
The Public Sphere from Outside the West, (Paperback) $61.34
$6134current price $61.34The Public Sphere from Outside the West, (Paperback)
Round about a Pound a Week, (Paperback) $16.31 Was $19.21
$1631current price $16.31, Was $19.21$19.21Round about a Pound a Week, (Paperback)
Entrepreneurship, (Paperback) $69.31
$6931current price $69.31Entrepreneurship, (Paperback)
Data in Astronomy, (Paperback) $58.00
$5800current price $58.00Data in Astronomy, (Paperback)
Communication and Information Science Cableviewing, (Paperback) $70.29
$7029current price $70.29Communication and Information Science Cableviewing, (Paperback)
Physikalisch-Technische Grundlagen, (Paperback) $49.99
$4999current price $49.99Physikalisch-Technische Grundlagen, (Paperback)
Handbuch Für Kaufleute, (Paperback) $58.42
$5842current price $58.42Handbuch Für Kaufleute, (Paperback)
Springerbriefs in Philosophy David Hume, Sceptic, (Paperback) $56.14
$5614current price $56.14Springerbriefs in Philosophy David Hume, Sceptic, (Paperback)
Quantenmechanik Und Philosophie, (Paperback) $59.99
$5999current price $59.99Quantenmechanik Und Philosophie, (Paperback)
A Manual of Occultism; c.1, (Paperback) $25.95
$2595current price $25.95A Manual of Occultism; c.1, (Paperback)
Applications of Computer Algebra, (Paperback) $54.99
$5499current price $54.99Applications of Computer Algebra, (Paperback)
The Violences of Men (Paperback) $39.95
$3995current price $39.95The Violences of Men (Paperback)
Function Algebras, (Paperback) $54.99
$5499current price $54.99Function Algebras, (Paperback)
The Power of Words, (Paperback) $53.59
$5359current price $53.59The Power of Words, (Paperback)
Mind and Rights: The History, Ethics, Law and Psychology of Human Rights, (Paperback) $46.36
$4636current price $46.36Mind and Rights: The History, Ethics, Law and Psychology of Human Rights, (Paperback)
MongoDBHighAvailability (Paperback) $36.76
$3676current price $36.76MongoDBHighAvailability (Paperback)
Patriot Run, (Paperback) $17.36
$1736current price $17.36Patriot Run, (Paperback)
Practical Psychology And Sex Life (Paperback) $62.62
$6262current price $62.62Practical Psychology And Sex Life (Paperback)
The Personality Of Man, (Paperback) $24.43
$2443current price $24.43The Personality Of Man, (Paperback)
Customer ratings & reviews
How item rating is calculated
Filtered and sorted results would be available on the new 'Customer ratings & reviews' page.
Sort by |
Showing 1-1 of 1 review
Feb 24, 2026
Jeffrey
Top Reviewer
1 out of 5 stars review
Verified Purchase
It's the seller, Books Xpress. The name is a joke. Estimated arrival 10 days out, day before delayed. I don't know why Walmart uses them. This has been my experience every time. Then I cancel, then they say it shipped which is usually 3-5 days later? Horrible service, I don't know how they have such a high rating. Read the most recent and most are 0-1 stars.
Helpful?3Z61HKLW7H4W872004415

