000 07384cam a2200745 a 4500
001 on1176314918
003 OCoLC
005 20240523125542.0
006 m o d
007 cr |n|||||||||
008 200723s2020 inu o 001 0 eng d
040 _aYDX
_beng
_epn
_cYDX
_dEBLCP
_dDG1
_dRECBK
_dN$T
_dUKAHL
_dOCLCF
_dK6U
_dOCLCO
_dTAC
_dOCLCQ
_dOCLCO
_dSFB
_dTEFOD
_dOCLCQ
_dVLB
_dOCLCO
_dOCLCL
_dIEEEE
019 _a1178642863
_a1302703582
020 _a9781119612216
_q(electronic bk. ;
_qoBook)
020 _a1119612217
_q(electronic bk. ;
_qoBook)
020 _a9781119612223
_q(electronic bk.)
020 _a1119612225
_q(electronic bk.)
020 _a9781119615453
_q(electronic bk.)
020 _a1119615453
_q(electronic bk.)
020 _z1119612209
020 _z9781119612209
024 7 _a10.1002/9781119612216
_2doi
029 1 _aAU@
_b000067633375
029 1 _aAU@
_b000068846548
029 1 _aCHNEW
_b001089882
029 1 _aCHVBK
_b600432025
035 _a(OCoLC)1176314918
_z(OCoLC)1178642863
_z(OCoLC)1302703582
037 _a64D6C8D5-B9DB-4ABF-B895-D8EB926D6397
_bOverDrive, Inc.
_nhttp://www.overdrive.com
037 _a10495380
_bIEEE
050 4 _aQA76.9.A25
082 0 4 _a005.8/24
_223
049 _aMAIN
100 1 _aBray, Shannon,
_d1972-
_1https://id.oclc.org/worldcat/entity/E39PCjyywCBqGjcqJtcG4CWcvb
245 1 0 _aImplementing cryptography using Python /
_cShannon W. Bray.
260 _aIndianapolis :
_bWiley,
_c2020.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aCover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- Chapter 1 Introduction to Cryptography and Python -- Exploring Algorithms -- Why Use Python? -- Downloading and Installing Python -- Installing on Ubuntu -- Installing on macOS -- Installing on Windows -- Installing on a Chromebook -- Installing Additional Packages -- Installing Pip, NumPy, and Matplotlib -- Installing the Cryptography Package -- Installing Additional Packages -- Testing Your Install -- Diving into Python Basics -- Using Variables
505 8 _aUsing Strings -- Introducing Operators -- Understanding Arithmetic Operators -- Understanding Comparison Operators -- Understanding Logical Operators -- Understanding Assignment Operators -- Understanding Bitwise Operators -- Understanding Membership Operators -- Understanding Identity Operators -- Using Conditionals -- Using Loops -- for -- while -- continue -- break -- else -- Using Files -- Understanding Python Semantics -- Sequence Types -- Introducing Custom Functions -- Downloading Files Using Python -- Introducing Python Modules -- Creating a Reverse Cipher -- Summary
505 8 _aChapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering
505 8 _aAnalytical Attacks -- Frequency Analysis -- Attack Models -- Shannon's Theorem -- One-Time Pad -- XOR, AND, and OR -- One-Time Pad Function -- One-Way Hashes -- Cryptographic One-Way Hashes -- Message Authentication Codes -- Perfect Forward Secrecy -- Published and Proprietary Encryption Algorithms -- Summary -- References -- Chapter 3 Classical Cryptography -- Password Best Practices -- Password Storage -- Hashing Passwords -- Salting Passwords -- Stretching Passwords -- Password Tools -- Obfuscating Data -- ASCII Encoding -- Base64 Encoding Text -- Binary Data -- Decoding -- Historical Ciphers
505 8 _aScytale of Sparta -- Substitution Ciphers -- Caesar Cipher -- ROT-13 -- Atbash Cipher -- Vigen�ere Cipher -- Playfair -- Hill 2x2 -- Column Transposition -- Affine Cipher -- Summary -- Chapter 4 Cryptographic Math and Frequency Analysis -- Modular Arithmetic and the Greatest Common Devisor -- Prime Numbers -- Prime Number Theorem -- School Primality Test -- Fermat's Little Theorem -- Miller-Rabin Primality Test -- Generate Large Prime Numbers -- Basic Group Theory -- Orders of Elements -- Modular Inverses -- Fermat's Little Theorem to Find the Inverse -- Extending the GCD -- Euler's Theorem
500 _aIncludes index.
520 _aLearn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users, data, and assets. Implementing Cryptography Using Python will teach you the essentials, so you can apply proven cryptographic tools to secure your applications and systems. Because this book uses Python, an easily accessible language that has become one of the standards for cryptography implementation, you'll be able to quickly learn how to secure applications and data of all kinds. In this easy-to-read guide, well-known cybersecurity expert Shannon Bray walks you through creating secure communications in public channels using public-key cryptography. You'll also explore methods of authenticating messages to ensure that they haven't been tampered with in transit. Finally, you'll learn how to use digital signatures to let others verify the messages sent through your services.-Learn how to implement proven cryptographic tools, using easy-to-understand examples written in Python -Discover the history of cryptography and understand its critical importance in today's digital communication systems -Work through real-world examples to understand the pros and cons of various authentication methods -Protect your end-users and ensure that your applications and systems are using up-to-date cryptography.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aData encryption (Computer science)
650 0 _aPython (Computer program language)
650 6 _aChiffrement (Informatique)
650 6 _aPython (Langage de programmation)
650 7 _aCOMPUTERS
_xSecurity
_xCryptography & Encryption.
_2bisacsh
650 7 _aData encryption (Computer science)
_2fast
650 7 _aPython (Computer program language)
_2fast
758 _ihas work:
_aImplementing cryptography using Python (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGvC4wxJTB6ttgwtYJjHmd
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_z1119612209
_z9781119612209
_w(OCoLC)1107565520
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119612216
938 _aAskews and Holts Library Services
_bASKH
_nAH36964327
938 _aAskews and Holts Library Services
_bASKH
_nAH36964322
938 _aProQuest Ebook Central
_bEBLB
_nEBL6265337
938 _aEBSCOhost
_bEBSC
_n2528576
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00831547
938 _aYBP Library Services
_bYANK
_n16850301
994 _a92
_bINLUM
999 _c12724
_d12724