{
"item_title" : "The Quantum-Ready Architect",
"item_author" : [" Caden Rourke "],
"item_description" : "Quantum computers aren't here to ruin your week... yet. But the cryptography protecting today's internet? A lot of it comes with an expiration date. If you build or run modern systems, post-quantum cryptography (PQC) isn't a future problem. It's a migration problem. And migrations have a special talent for breaking production at 2:00 a.m. The Quantum-Ready Architect is your practical, architecture-first guide to upgrading real systems using hybrid cryptography (classical + PQC)-without panic, theory overload, or just re-encrypt everything nonsense.This is not a math textbook.This is a ship it safely playbook.If you're responsible for any of this...TLS and mTLS across load balancers, gateways, proxies, and service meshesPKI, certificates, trust stores, rotations, and renewalsVPNs, remote access, and Zero Trust networkingCode signing, CI/CD pipelines, artifacts, and firmware updatesLong-term data security (backups, archives, compliance retention)...then you're in the right place. What you'll actually learn (and implement)How to find crypto hiding in your stack with a Crypto Bill of Materials (CBOM)How to prioritize migration using risk + data shelf-life scoringProven hybrid deployment patterns you can roll out incrementallyHow to modernize PKI without triggering a certificate apocalypseHow to upgrade TLS/mTLS and QUIC with canary releases + rollback plansHow to protect data at rest (KMS/HSM workflows, rewrap vs re-encrypt)How to keep the software supply chain secure with transitional signing strategiesHow to test interoperability, measure performance, monitor failures, and stay saneWho this book is for Architects, security engineers, platform engineers, SREs, and technical leaders who want to go from: We should be quantum-ready someday to We have a real plan, a rollout path, and working hybrid crypto in production. Who this book is NOT for If you want deep cryptographic proofs and heavy math-there are excellent academic texts for that. This book is for people who need to make systems survive the future and stay online today.Quantum is coming.Your legacy systems are not ready.Let's fix that-one safe rollout at a time.Start now. Migrate smart. Stay ahead.",
"item_img_path" : "https://covers4.booksamillion.com/covers/bam/9/79/825/055/9798250554367_b.jpg",
"price_data" : {
"retail_price" : "47.99", "online_price" : "47.99", "our_price" : "47.99", "club_price" : "47.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : ""
}
}
The Quantum-Ready Architect : Building Hybrid Systems and Implementing Post-Quantum Cryptography
by Caden Rourke
Overview
Quantum computers aren't here to ruin your week... yet. But the cryptography protecting today's internet? A lot of it comes with an expiration date. If you build or run modern systems, post-quantum cryptography (PQC) isn't a "future problem." It's a migration problem. And migrations have a special talent for breaking production at 2:00 a.m. The Quantum-Ready Architect is your practical, architecture-first guide to upgrading real systems using hybrid cryptography (classical + PQC)-without panic, theory overload, or "just re-encrypt everything" nonsense.
- This is not a math textbook.
- This is a "ship it safely" playbook.
If you're responsible for any of this...
- TLS and mTLS across load balancers, gateways, proxies, and service meshes
- PKI, certificates, trust stores, rotations, and renewals
- VPNs, remote access, and Zero Trust networking
- Code signing, CI/CD pipelines, artifacts, and firmware updates
- Long-term data security (backups, archives, compliance retention)
...then you're in the right place. What you'll actually learn (and implement)
- How to find crypto hiding in your stack with a Crypto Bill of Materials (CBOM)
- How to prioritize migration using risk + data shelf-life scoring
- Proven hybrid deployment patterns you can roll out incrementally
- How to modernize PKI without triggering a certificate apocalypse
- How to upgrade TLS/mTLS and QUIC with canary releases + rollback plans
- How to protect data at rest (KMS/HSM workflows, rewrap vs re-encrypt)
- How to keep the software supply chain secure with transitional signing strategies
- How to test interoperability, measure performance, monitor failures, and stay sane
- Quantum is coming.
- Your legacy systems are not ready.
- Let's fix that-one safe rollout at a time.
Start now. Migrate smart. Stay ahead.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9798250554367
- ISBN-10: 9798250554367
- Publisher: Independently Published
- Publish Date: March 2026
- Dimensions: 11 x 8.5 x 0.91 inches
- Shipping Weight: 2.28 pounds
- Page Count: 450
Related Categories
