|
Showing 1 - 2 of
2 matches in All Departments
ONE-VOLUME INTRODUCTION TO QUANTUM COMPUTING Clearly explains core
concepts, terminology, and techniques Covers the foundational
physics, math, and information theory you need Provides hands-on
practice with quantum programming The perfect beginner's guide for
anyone interested in a quantum computing career Dr. Chuck Easttom
brings together complete coverage of basic quantum computing
concepts, terminology, and issues, along with key skills to get you
started. Drawing on 30+ years as a computer science instructor,
consultant, and researcher, Easttom demystifies the field's
underlying technical concepts and math, shows how quantum computing
systems are designed and built, explains their implications for
cyber security, and previews advances in quantum-resistant
cryptography. Writing clearly and simply, he introduces two of
today's leading quantum programming languages, Microsoft Q# and
QASM, and guides you through sample projects. Throughout, tests,
projects, and review questions help you deepen and apply your
knowledge. Whether you're a student, professional, or manager, this
guide will prepare you for the quantum computing revolution--and
expand your career options, too. Master the linear algebra and
other mathematical skills you'll need Explore key physics ideas
such as quantum states and uncertainty Review data structures,
algorithms, and computing complexity Work with probability and set
theory in quantum computing Familiarize yourself with basic quantum
theory and formulae Understand quantum entanglement and quantum key
distribution Discover how quantum computers are architected and
built Explore several leading quantum algorithms Compare quantum
and conventional asymmetric algorithms See how quantum computing
might break traditional cryptography Discover several approaches to
quantum-resistant cryptography Start coding with Q#, Microsoft's
quantum programming language Simulate quantum gates and algorithms
with QASM
All you need to know about defending networks, in one book *
Clearly explains concepts, terminology, challenges, tools, and
skills * Covers key security standards and models for business and
government * The perfect introduction for all network/computer
security professionals and students Welcome to today's most useful
and practical introduction to defending modern networks. Drawing on
decades of experience, Chuck Easttom brings together updated
coverage of all the concepts, terminology, techniques, and
solutions you'll need to be effective. Easttom thoroughly
introduces the core technologies of modern network security,
including firewalls, intrusion-detection systems, and VPNs. Next,
he shows how encryption can be used to safeguard data as it moves
across networks. You'll learn how to harden operating systems,
defend against malware and network attacks, establish robust
security policies, and assess network security using
industry-leading standards and models. You'll also find thorough
coverage of key issues such as physical security, forensics, and
cyberterrorism. Throughout, Easttom blends theory and application,
helping you understand both what to do and why. In every chapter,
quizzes, exercises, projects, and web resources deepen your
understanding and help you use what you've learned-in the classroom
and in your career. Learn How To * Evaluate key network risks and
dangers * Choose the right network security approach for your
organization * Anticipate and counter widespread network attacks,
including those based on "social engineering" * Successfully deploy
and apply firewalls and intrusion detection systems * Secure
network communication with virtual private networks * Protect data
with cryptographic public/private key systems, digital signatures,
and certificates * Defend against malware, including ransomware,
Trojan horses, and spyware * Harden operating systems and keep
their security up to date * Define and implement security policies
that reduce risk * Explore leading security standards and models,
including ISO and NIST standards * Prepare for an investigation if
your network has been attacked * &nb
|
|