000 | 07384cam a2200745 a 4500 | ||
---|---|---|---|
001 | on1176314918 | ||
003 | OCoLC | ||
005 | 20240523125542.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 200723s2020 inu o 001 0 eng d | ||
040 |
_aYDX _beng _epn _cYDX _dEBLCP _dDG1 _dRECBK _dN$T _dUKAHL _dOCLCF _dK6U _dOCLCO _dTAC _dOCLCQ _dOCLCO _dSFB _dTEFOD _dOCLCQ _dVLB _dOCLCO _dOCLCL _dIEEEE |
||
019 |
_a1178642863 _a1302703582 |
||
020 |
_a9781119612216 _q(electronic bk. ; _qoBook) |
||
020 |
_a1119612217 _q(electronic bk. ; _qoBook) |
||
020 |
_a9781119612223 _q(electronic bk.) |
||
020 |
_a1119612225 _q(electronic bk.) |
||
020 |
_a9781119615453 _q(electronic bk.) |
||
020 |
_a1119615453 _q(electronic bk.) |
||
020 | _z1119612209 | ||
020 | _z9781119612209 | ||
024 | 7 |
_a10.1002/9781119612216 _2doi |
|
029 | 1 |
_aAU@ _b000067633375 |
|
029 | 1 |
_aAU@ _b000068846548 |
|
029 | 1 |
_aCHNEW _b001089882 |
|
029 | 1 |
_aCHVBK _b600432025 |
|
035 |
_a(OCoLC)1176314918 _z(OCoLC)1178642863 _z(OCoLC)1302703582 |
||
037 |
_a64D6C8D5-B9DB-4ABF-B895-D8EB926D6397 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
037 |
_a10495380 _bIEEE |
||
050 | 4 | _aQA76.9.A25 | |
082 | 0 | 4 |
_a005.8/24 _223 |
049 | _aMAIN | ||
100 | 1 |
_aBray, Shannon, _d1972- _1https://id.oclc.org/worldcat/entity/E39PCjyywCBqGjcqJtcG4CWcvb |
|
245 | 1 | 0 |
_aImplementing cryptography using Python / _cShannon W. Bray. |
260 |
_aIndianapolis : _bWiley, _c2020. |
||
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aCover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- Chapter 1 Introduction to Cryptography and Python -- Exploring Algorithms -- Why Use Python? -- Downloading and Installing Python -- Installing on Ubuntu -- Installing on macOS -- Installing on Windows -- Installing on a Chromebook -- Installing Additional Packages -- Installing Pip, NumPy, and Matplotlib -- Installing the Cryptography Package -- Installing Additional Packages -- Testing Your Install -- Diving into Python Basics -- Using Variables | |
505 | 8 | _aUsing Strings -- Introducing Operators -- Understanding Arithmetic Operators -- Understanding Comparison Operators -- Understanding Logical Operators -- Understanding Assignment Operators -- Understanding Bitwise Operators -- Understanding Membership Operators -- Understanding Identity Operators -- Using Conditionals -- Using Loops -- for -- while -- continue -- break -- else -- Using Files -- Understanding Python Semantics -- Sequence Types -- Introducing Custom Functions -- Downloading Files Using Python -- Introducing Python Modules -- Creating a Reverse Cipher -- Summary | |
505 | 8 | _aChapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering | |
505 | 8 | _aAnalytical Attacks -- Frequency Analysis -- Attack Models -- Shannon's Theorem -- One-Time Pad -- XOR, AND, and OR -- One-Time Pad Function -- One-Way Hashes -- Cryptographic One-Way Hashes -- Message Authentication Codes -- Perfect Forward Secrecy -- Published and Proprietary Encryption Algorithms -- Summary -- References -- Chapter 3 Classical Cryptography -- Password Best Practices -- Password Storage -- Hashing Passwords -- Salting Passwords -- Stretching Passwords -- Password Tools -- Obfuscating Data -- ASCII Encoding -- Base64 Encoding Text -- Binary Data -- Decoding -- Historical Ciphers | |
505 | 8 | _aScytale of Sparta -- Substitution Ciphers -- Caesar Cipher -- ROT-13 -- Atbash Cipher -- Vigen�ere Cipher -- Playfair -- Hill 2x2 -- Column Transposition -- Affine Cipher -- Summary -- Chapter 4 Cryptographic Math and Frequency Analysis -- Modular Arithmetic and the Greatest Common Devisor -- Prime Numbers -- Prime Number Theorem -- School Primality Test -- Fermat's Little Theorem -- Miller-Rabin Primality Test -- Generate Large Prime Numbers -- Basic Group Theory -- Orders of Elements -- Modular Inverses -- Fermat's Little Theorem to Find the Inverse -- Extending the GCD -- Euler's Theorem | |
500 | _aIncludes index. | ||
520 | _aLearn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users, data, and assets. Implementing Cryptography Using Python will teach you the essentials, so you can apply proven cryptographic tools to secure your applications and systems. Because this book uses Python, an easily accessible language that has become one of the standards for cryptography implementation, you'll be able to quickly learn how to secure applications and data of all kinds. In this easy-to-read guide, well-known cybersecurity expert Shannon Bray walks you through creating secure communications in public channels using public-key cryptography. You'll also explore methods of authenticating messages to ensure that they haven't been tampered with in transit. Finally, you'll learn how to use digital signatures to let others verify the messages sent through your services.-Learn how to implement proven cryptographic tools, using easy-to-understand examples written in Python -Discover the history of cryptography and understand its critical importance in today's digital communication systems -Work through real-world examples to understand the pros and cons of various authentication methods -Protect your end-users and ensure that your applications and systems are using up-to-date cryptography. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aData encryption (Computer science) | |
650 | 0 | _aPython (Computer program language) | |
650 | 6 | _aChiffrement (Informatique) | |
650 | 6 | _aPython (Langage de programmation) | |
650 | 7 |
_aCOMPUTERS _xSecurity _xCryptography & Encryption. _2bisacsh |
|
650 | 7 |
_aData encryption (Computer science) _2fast |
|
650 | 7 |
_aPython (Computer program language) _2fast |
|
758 |
_ihas work: _aImplementing cryptography using Python (Text) _1https://id.oclc.org/worldcat/entity/E39PCGvC4wxJTB6ttgwtYJjHmd _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _z1119612209 _z9781119612209 _w(OCoLC)1107565520 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216 |
938 |
_aAskews and Holts Library Services _bASKH _nAH36964327 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH36964322 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL6265337 |
||
938 |
_aEBSCOhost _bEBSC _n2528576 |
||
938 |
_aRecorded Books, LLC _bRECE _nrbeEB00831547 |
||
938 |
_aYBP Library Services _bYANK _n16850301 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12724 _d12724 |