Torrent details for "Hammoudeh M. Quantum Computing. A Journey into the Next Frontier…" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
None
Total Size:
16.3 MB
Info Hash:
BCB73CC772D151333EDCA60111BA89DEACFD3D0D
Added By:
Added:
April 22, 2026, 3:28 p.m.
Stats:
|
(Last updated: April 22, 2026, 3:29 p.m.)
| File | Size |
|---|---|
| Hammoudeh M. Quantum Computing. A Journey into the Next Frontier...Security 2025.pdf | 16.3 MB |
Name
DL
Uploader
Size
S/L
Added
NOTE
SOURCE: Hammoudeh M. Quantum Computing. A Journey into the Next Frontier...Security 2025
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
Textbook in PDF format This book explores the exciting world of Quantum Computing, from its theoretical foundations to its practical applications, offering both non-technical and expert readers a comprehensive and accessible introduction to this cutting-edge technology that has the potential to revolutionize the way we process and transmit information. Quantum Computing: A Journey into the Next Frontier of Information and Communication Security provides a comprehensive guide to the exciting and rapidly evolving field of Quantum Computing and communication security. The book starts by introducing the theoretical foundations of quantum mechanics and quantum computing, providing readers with a solid understanding of the principles behind this revolutionary technology. The book emphasizes the practical applications of Quantum Computing and its adoption strategies in response to the urgency of quantum readiness. While many books on the subject focus solely on the theory, this book explores the risks and opportunities of Quantum Computing, and how to prepare and adopt this technology. From there, the book explores various quantum concepts and their security applications, covering topics such as quantum-safe cryptography, standards, implications on Artificial Intelligence, and optimization. The Chapter 3 is dedicated to demystifying quantum programming. In contrast to classical programming, which functions using classical bits, quantum programming leverages the capabilities of qubits, which are the fundamental units of quantum computation. Qubits are derived from the principles of quantum mechanics and possess distinctive characteristics, including superposition and entanglement, that enable information representation and processing in ways that defy classical intuition. In this section, we use Qiskit library from IBM to program quantum circuits. This library enables the simulation of a quantum computer and the utilization of a real one. The programming language used is Python. We present two programs: the Hadamard gate and the X gate. The simulation of these circuits is done in two ways. The first one allows obtaining results in the form of quantum states (qubits). The book is written for students, researchers, technology leaders, and professionals who work in the field of cybersecurity, communications, digital transformation, data analytics, and information systems. The book is suitable for researchers with various technical knowledge. Preface Chapter 1 A Primer on Quantum Computing and Quantum Communications Chapter 2 Basics of Quantum Computing Chapter 3 Fundamentals of Quantum Programming Chapter 4 Seminal Quantum Algorithms Description and Programming Chapter 5 Grover’s Algorithm Chapter 6 Quantum Key Distribution Principles and Protocols Chapter 7 Quantum Key Distribution, Security, and Analysis Chapter 8 Quantum Random Number Generation Chapter 9 Managing the Quantum Cybersecurity Threat Chapter 10 Post-Quantum Cryptography in Embedded Systems, Future Trends, and Research Directions Chapter 11 Assessing Quantum Integer Factorization Performance with Shor’s Algorithm Chapter 12 Quantum Computing Based Attacks on Cryptography and Countermeasures
×


