Systematic Security: Building Quantum Security : Preparing for Q-Day and Beyond
Systematic Security: Building Quantum Security : Preparing for Q-Day and Beyond
Click to enlarge
Author(s): Qader, Timur
ISBN No.: 9781041166641
Pages: 256
Year: 202601
Format: Trade Paper
Price: $ 82.79
Dispatch delay: Dispatched between 7 to 15 days
Status: Available (Forthcoming)

CHAPTER 1: INTRODUCTION. OUR PATH FORWARD. THE UNDISCOVERED FUTURE. Q-DAY, Y2Q AND EVERYTHING IN-BETWEEN. THEY DIDN'T LIKE IT. CHAPTER 2: THE PHYSICS BEHIND QUANTUM COMPUTING. THE ATOM. BLACKBODY, ULTRAVIOLET CATASTROPHE & MAX PLANCK.


EINSTEIN & HIS DEALINGS. BOHR'S MODEL: HALF-LIVES, ENERGY TRANSITIONS, AND PROBABILITY. MODERN CHEMISTRY. THE EMERGENCE OF QUANTUM MECHANICS. WAVES & SLITS IN EXPERIMENTS. CHAPTER 2 REFERENCES. CHAPTER 3: QUANTUM COMPUTING FOR SECURITY PROFESSIONALS. THE PATH TO COMPUTING: SEMICONDUCTORS & SUPERCONDUCTORS.


WHAT DOES IT MEAN TO COMPUTE?. SIMULATING PHYSICS THROUGH COMPUTERS. DAVID DEUTSCH AND THE BIRTH OF QUANTUM COMPUTING. FEATURES AND FUNCTIONALITY. TECHNIQUES TO CREATE QUANTUM COMPUTERS. CURRENT EVENTS IN QUANTUM COMPUTING (2025). CHAPTER 3 REFERENCES. CHAPTER 4: CRYPTOGRAPHY AND QUANTUM.


CRYPTOGRAPHY OVER THE CENTURIES. THE WORLD WARS. MODERN CRYPTOGRAPHY. THE QUANTUM THREAT: 2020S AND BEYOND. BREAKING CRYPTOGRAPHY WITH QUANTUM COMPUTERS. HASH FUNCTIONS. FINAL SUMMARY OF CRYPTOGRAPHY FOR CLARITY. CHAPTER 4 REFERENCES.


CHAPTER 5: QUANTUM-PRONE SECURITY WEAKNESSES AND REMEDIATION. PRIMARY WEAKNESSES FACED IN THE FIELD. INDUSTRY ADOPTED ROADMAPS FOR REMEDIATION. CASE STUDIES FOR REMEDIATION OF WEAKNESSES. RECOMMENDED STACK FOR QUANTUM RESILIENCE. TIMELINE & IMPLEMENTATION REVISITED. CHAPTER 5 REFERENCES. CHAPTER 6: SECURING WITH QUANTUM.


IDENTITY AND AUTHENTICATION. QUANTUM-ENHANCED THREAT DETECTION. OPTIMIZED SECURITY DEFENSES. ROOT CAUSE ANALYSIS AND INCIDENT CORRELATION. SECURITY FORENSIC IMPROVEMENTS. PROOF OF CONCEPTS IN SECURING WITH QUANTUM. ROUNDING UP THE OPPORTUNITIES. CHAPTER 6 REFERENCES.


CHAPTER 7: ENHANCED SECURITY IN DATA COMMUNICATIONS. QUANTUM INTERNET WITH TELEPORTATION. BENEFITS OF TELEPORTATION FOR SECURE NETWORKING. QUANTUM SECURE CLOUD COMPUTING. TELECOMMUNICATIONS AND MOBILITY. THE NOISY INTERMEDIATE-SCALE QUANTUM (NISQ). CHAPTER 7 REFERENCES. CHAPTER 8: SECURING PRODUCTS AND SOFTWARE.


APPROACHING PRODUCT DEVELOPMENT WITH QUANTUM. SECURING SOFTWARE DEVELOPMENT. SECURING HARDWARE DEVELOPMENT. SEMICONDUCTOR CHIPS & EXPOSURE. OTHER INDUSTRIES OF NOTE. MANUFACTURING AND OT. EDGE COMPUTING. CHAPTER 8 REFERENCES.


CHAPTER 9: ACTION PLANS AND PREPARATION. QUANTUM SECURITY MATURITY MODELING. NEAR-TERM & ESSENTIAL: IMPLEMENTATION PLANNING. TIMELINE FOR IMPLEMENTATION. MID-TERM ACTIVITIES AND PREPARATION (~2030 - 2040). LONG-TERM ACTIVITIES AND PREPARATION (~2040+). CHAPTER 9 REFERENCES. CHAPTER 10: TAKEAWAYS AND RECOMMENDATIONS.


ESSENTIAL QUANTUM SECURITY PHYSICS. KEYS TO QUANTUM COMPUTING - THE QUANTUM SHIFT. SOLVE THE CRYPTOGRAPHY PROBLEM FIRST. QUANTUM RESILIENCE PLANNING. DISRUPTIVE CAPABILITIES AND INNOVATION. MEASURING YOUR MATURITY. CLOSING STATEMENTS. Chapter 10 References.



To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...