LEADER 00999nam a2200265 i 4500 001 991001576869707536 005 20020503123153.0 008 980522s1995 it ||| | ita 020 $a8806138480 035 $ab10240901-39ule_inst 035 $aLE01280469$9ExL 040 $aDip.to Lingue$bita 100 1 $aByatt, Antonia S.$0163804 245 13$aIl genio nell'occhio d'usignolo ; traduzione di Anna Nadotti e Fausto Galuzzi /$cAntonia S. Byatt 260 $aTorino :$bEinaudi,$c1995 300 $a115 p. ;$c22 cm. 440 4$aThe Djinn in the nightingale's eye 700 1 $aNadotti, Anna 700 1 $aGaluzzi, Fausto 907 $a.b10240901$b21-09-06$c27-06-02 912 $a991001576869707536 945 $aLE012 828.914 BYA 5$g1$i2012000000766$lle012$o-$pE0.00$q-$rl$s- $t0$u3$v0$w3$x0$y.i10290965$z27-06-02 996 $aGenio nell'occhio d'usignolo ; traduzione di Anna Nadotti e Fausto Galuzzi$9206965 997 $aUNISALENTO 998 $ale012$b01-01-98$cm$da $e-$fita$git $h3$i1 LEADER 00940nam2 22002533i 450 001 UBO1453162 005 20231121125856.0 100 $a20171018d1972 ||||0itac50 ba 101 | $alat$aita 102 $anl 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 0 $a2. Commentario 210 $aLeiden$cJ. Brill$d1972 215 $aP. 226-615$d25 cm. 462 1$1001SBL0227744$12001 $a˜2: œP. Ovidii Nasonis Halieuticon$fa cura di Filippo Capponi$v2$1700 1$aOvidius Naso$b, Publius$3CFIV002690$4070$1702 1$aCapponi$b, Filippo$3LO1V035348$4340 801 3$aIT$bIT-01$c20171018 850 $aIT-FR0017 899 $aBiblioteca umanistica Giorgio Aprea$bFR0017 $eN 912 $aUBO1453162 950 2$aBiblioteca umanistica Giorgio Aprea$d 52S.SIJ. LL2 Ovi.Hal.Cap. 2$e 52DUP0000227145 VMB RS $fA $h20171018$i20171018 977 $a 52 996 $aCommentario$91407416 997 $aUNICAS LEADER 03472nam 2200493 450 001 9910816960703321 005 20191111064343.0 010 $a1-119-61822-3 010 $a1-119-61823-1 010 $a1-119-61821-5 035 $a(CKB)4100000009590183 035 $a(MiAaPQ)EBC5946044 035 $a(PPN)272710679 035 $a(CaSebORM)9781119618195 035 $a(OCoLC)1124762814 035 $a(EXLCZ)994100000009590183 100 $a20191111d2020 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptography apocalypse $epreparing for the day when quantum computing breaks today's crypto /$fRoger A Grimes 205 $a1st edition 210 1$aHoboken, New Jersey :$cWiley,$d[2020] 210 4$d©2020 215 $a1 online resource (275 pages) 311 $a1-119-61819-3 330 $aWill your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized ?crackers? to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today?s computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day?HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication?will be virtually useless. . . unless you prepare. Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book: Gives a simple quantum mechanics primer Explains how quantum computing will break current cryptography Offers practical advice for preparing for a post-quantum world Presents the latest information on new cryptographic methods Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it. 606 $aData encryption (Computer science) 606 $aCryptography 606 $aQuantum computing 615 0$aData encryption (Computer science) 615 0$aCryptography. 615 0$aQuantum computing. 676 $a005.82 700 $aGrimes$b Roger A.$01042670 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910816960703321 996 $aCryptography apocalypse$93937276 997 $aUNINA