Implementing cryptography using Python / (Record no. 12724)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07384cam a2200745 a 4500 |
001 - CONTROL NUMBER | |
control field | on1176314918 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125542.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr |n||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200723s2020 inu o 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | YDX |
Language of cataloging | eng |
Description conventions | pn |
Transcribing agency | YDX |
Modifying agency | EBLCP |
-- | DG1 |
-- | RECBK |
-- | N$T |
-- | UKAHL |
-- | OCLCF |
-- | K6U |
-- | OCLCO |
-- | TAC |
-- | OCLCQ |
-- | OCLCO |
-- | SFB |
-- | TEFOD |
-- | OCLCQ |
-- | VLB |
-- | OCLCO |
-- | OCLCL |
-- | IEEEE |
019 ## - | |
-- | 1178642863 |
-- | 1302703582 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119612216 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119612217 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119612223 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119612225 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119615453 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119615453 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1119612209 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119612209 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781119612216 |
Source of number or code | doi |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000067633375 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000068846548 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHNEW |
System control number | 001089882 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 600432025 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1176314918 |
Canceled/invalid control number | (OCoLC)1178642863 |
-- | (OCoLC)1302703582 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 64D6C8D5-B9DB-4ABF-B895-D8EB926D6397 |
Source of stock number/acquisition | OverDrive, Inc. |
Note | http://www.overdrive.com |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 10495380 |
Source of stock number/acquisition | IEEE |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8/24 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Bray, Shannon, |
Dates associated with a name | 1972- |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCjyywCBqGjcqJtcG4CWcvb |
245 10 - TITLE STATEMENT | |
Title | Implementing cryptography using Python / |
Statement of responsibility, etc. | Shannon W. Bray. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Indianapolis : |
Name of publisher, distributor, etc. | Wiley, |
Date of publication, distribution, etc. | 2020. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- Chapter 1 Introduction to Cryptography and Python -- Exploring Algorithms -- Why Use Python? -- Downloading and Installing Python -- Installing on Ubuntu -- Installing on macOS -- Installing on Windows -- Installing on a Chromebook -- Installing Additional Packages -- Installing Pip, NumPy, and Matplotlib -- Installing the Cryptography Package -- Installing Additional Packages -- Testing Your Install -- Diving into Python Basics -- Using Variables |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Using Strings -- Introducing Operators -- Understanding Arithmetic Operators -- Understanding Comparison Operators -- Understanding Logical Operators -- Understanding Assignment Operators -- Understanding Bitwise Operators -- Understanding Membership Operators -- Understanding Identity Operators -- Using Conditionals -- Using Loops -- for -- while -- continue -- break -- else -- Using Files -- Understanding Python Semantics -- Sequence Types -- Introducing Custom Functions -- Downloading Files Using Python -- Introducing Python Modules -- Creating a Reverse Cipher -- Summary |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Analytical Attacks -- Frequency Analysis -- Attack Models -- Shannon's Theorem -- One-Time Pad -- XOR, AND, and OR -- One-Time Pad Function -- One-Way Hashes -- Cryptographic One-Way Hashes -- Message Authentication Codes -- Perfect Forward Secrecy -- Published and Proprietary Encryption Algorithms -- Summary -- References -- Chapter 3 Classical Cryptography -- Password Best Practices -- Password Storage -- Hashing Passwords -- Salting Passwords -- Stretching Passwords -- Password Tools -- Obfuscating Data -- ASCII Encoding -- Base64 Encoding Text -- Binary Data -- Decoding -- Historical Ciphers |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Scytale of Sparta -- Substitution Ciphers -- Caesar Cipher -- ROT-13 -- Atbash Cipher -- Vigen�ere Cipher -- Playfair -- Hill 2x2 -- Column Transposition -- Affine Cipher -- Summary -- Chapter 4 Cryptographic Math and Frequency Analysis -- Modular Arithmetic and the Greatest Common Devisor -- Prime Numbers -- Prime Number Theorem -- School Primality Test -- Fermat's Little Theorem -- Miller-Rabin Primality Test -- Generate Large Prime Numbers -- Basic Group Theory -- Orders of Elements -- Modular Inverses -- Fermat's Little Theorem to Find the Inverse -- Extending the GCD -- Euler's Theorem |
500 ## - GENERAL NOTE | |
General note | Includes index. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Learn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users, data, and assets. Implementing Cryptography Using Python will teach you the essentials, so you can apply proven cryptographic tools to secure your applications and systems. Because this book uses Python, an easily accessible language that has become one of the standards for cryptography implementation, you'll be able to quickly learn how to secure applications and data of all kinds. In this easy-to-read guide, well-known cybersecurity expert Shannon Bray walks you through creating secure communications in public channels using public-key cryptography. You'll also explore methods of authenticating messages to ensure that they haven't been tampered with in transit. Finally, you'll learn how to use digital signatures to let others verify the messages sent through your services.-Learn how to implement proven cryptographic tools, using easy-to-understand examples written in Python -Discover the history of cryptography and understand its critical importance in today's digital communication systems -Work through real-world examples to understand the pros and cons of various authentication methods -Protect your end-users and ensure that your applications and systems are using up-to-date cryptography. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Python (Computer program language) |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Chiffrement (Informatique) |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Python (Langage de programmation) |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS |
General subdivision | Security |
-- | Cryptography & Encryption. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science) |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Python (Computer program language) |
Source of heading or term | fast |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | Implementing cryptography using Python (Text) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCGvC4wxJTB6ttgwtYJjHmd |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
International Standard Book Number | 1119612209 |
-- | 9781119612209 |
Record control number | (OCoLC)1107565520 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216</a> |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH36964327 |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH36964322 |
938 ## - | |
-- | ProQuest Ebook Central |
-- | EBLB |
-- | EBL6265337 |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 2528576 |
938 ## - | |
-- | Recorded Books, LLC |
-- | RECE |
-- | rbeEB00831547 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 16850301 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.