Fr. 63.00

Cryptography and Cybersecurity in the Department of Defence - A Practical Guide to Encryption and National Security

English · Paperback / Softback

Will be released 22.03.2026

Description

Read more

This is a comprehensive guide that explores the principles, methodologies, and applications of cryptographic security within the U.S. Department of Defence (DoD). This book provides a structured approach to understanding encryption, network security, public key infrastructure (PKI), and quantum cryptography, bridging the gap between academic theory and real-world defence applications.
The book covers historical cryptographic methods, modern encryption standards, network hardening techniques, and strategies for securing data in transit. Readers will gain insight into secure communications, adversary tactics, and compliance with DoD security frameworks. With dedicated sections on post-quantum cryptography, wireless security, and cryptanalysis, this resource prepares cybersecurity professionals and government contractors for emerging threats in national security.
Designed for cybersecurity practitioners, defence professionals, and students, this book includes hands-on exercises, vocabulary breakdowns, and quizzes to reinforce learning. Whether you're an analyst, engineer, or policymaker, this guide serves as an essential reference for securing sensitive government systems and critical infrastructure against evolving cyber threats.
 
What You Will Learn:

  • Public key infrastructure
  • Historical ciphers and importance
  • Applied cryptography in an enterprise and DOD environment
 
Who This Book is for:
Cybersecurity practitioners, and defence professionals, and students

List of contents

Chapter 1: The Historical Evolution of Cryptography.- Chapter 2: Fundamentals.- Chapter 3: Hashing.- Chapter 4: Public Key Infrastructure.- Chapter 5: Email Security.- Chapter 6: Network Security.- Chapter 7: Data in Transit.- Chapter 8: Crypto Cracking.- Chapter 9: Wireless.- Chapter 10: Signal Flow for Antennas.- Chapter 11: Post-Quantum Cryptography.- Chapter 12: Quantum.- Chapter 13: Supplemental Content.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.