Cargando…

Implementing cryptography using Python /

Learn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Bray, Shannon, 1972-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis : Wiley, 2020.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_on1176314918
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 200723s2020 inu o 001 0 eng d
040 |a YDX  |b eng  |e pn  |c YDX  |d EBLCP  |d DG1  |d RECBK  |d N$T  |d UKAHL  |d OCLCF  |d K6U  |d OCLCO  |d TAC  |d OCLCQ  |d OCLCO  |d SFB  |d TEFOD  |d OCLCQ  |d VLB  |d OCLCO  |d OCLCL 
019 |a 1178642863  |a 1302703582 
020 |a 9781119612216  |q (electronic bk. ;  |q oBook) 
020 |a 1119612217  |q (electronic bk. ;  |q oBook) 
020 |a 9781119612223  |q (electronic bk.) 
020 |a 1119612225  |q (electronic bk.) 
020 |a 9781119615453  |q (electronic bk.) 
020 |a 1119615453  |q (electronic bk.) 
020 |z 1119612209 
020 |z 9781119612209 
029 1 |a AU@  |b 000067633375 
029 1 |a AU@  |b 000068846548 
029 1 |a CHNEW  |b 001089882 
029 1 |a CHVBK  |b 600432025 
035 |a (OCoLC)1176314918  |z (OCoLC)1178642863  |z (OCoLC)1302703582 
037 |a 64D6C8D5-B9DB-4ABF-B895-D8EB926D6397  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8/24  |2 23 
049 |a UAMI 
100 1 |a Bray, Shannon,  |d 1972-  |1 https://id.oclc.org/worldcat/entity/E39PCjyywCBqGjcqJtcG4CWcvb 
245 1 0 |a Implementing cryptography using Python /  |c Shannon W. Bray. 
260 |a Indianapolis :  |b Wiley,  |c 2020. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- Chapter 1 Introduction to Cryptography and Python -- Exploring Algorithms -- Why Use Python? -- Downloading and Installing Python -- Installing on Ubuntu -- Installing on macOS -- Installing on Windows -- Installing on a Chromebook -- Installing Additional Packages -- Installing Pip, NumPy, and Matplotlib -- Installing the Cryptography Package -- Installing Additional Packages -- Testing Your Install -- Diving into Python Basics -- Using Variables 
505 8 |a Using Strings -- Introducing Operators -- Understanding Arithmetic Operators -- Understanding Comparison Operators -- Understanding Logical Operators -- Understanding Assignment Operators -- Understanding Bitwise Operators -- Understanding Membership Operators -- Understanding Identity Operators -- Using Conditionals -- Using Loops -- for -- while -- continue -- break -- else -- Using Files -- Understanding Python Semantics -- Sequence Types -- Introducing Custom Functions -- Downloading Files Using Python -- Introducing Python Modules -- Creating a Reverse Cipher -- Summary 
505 8 |a Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering 
505 8 |a Analytical Attacks -- Frequency Analysis -- Attack Models -- Shannon's Theorem -- One-Time Pad -- XOR, AND, and OR -- One-Time Pad Function -- One-Way Hashes -- Cryptographic One-Way Hashes -- Message Authentication Codes -- Perfect Forward Secrecy -- Published and Proprietary Encryption Algorithms -- Summary -- References -- Chapter 3 Classical Cryptography -- Password Best Practices -- Password Storage -- Hashing Passwords -- Salting Passwords -- Stretching Passwords -- Password Tools -- Obfuscating Data -- ASCII Encoding -- Base64 Encoding Text -- Binary Data -- Decoding -- Historical Ciphers 
505 8 |a Scytale of Sparta -- Substitution Ciphers -- Caesar Cipher -- ROT-13 -- Atbash Cipher -- Vigenère Cipher -- Playfair -- Hill 2x2 -- Column Transposition -- Affine Cipher -- Summary -- Chapter 4 Cryptographic Math and Frequency Analysis -- Modular Arithmetic and the Greatest Common Devisor -- Prime Numbers -- Prime Number Theorem -- School Primality Test -- Fermat's Little Theorem -- Miller-Rabin Primality Test -- Generate Large Prime Numbers -- Basic Group Theory -- Orders of Elements -- Modular Inverses -- Fermat's Little Theorem to Find the Inverse -- Extending the GCD -- Euler's Theorem 
500 |a Includes index. 
520 |a Learn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users, data, and assets. Implementing Cryptography Using Python will teach you the essentials, so you can apply proven cryptographic tools to secure your applications and systems. Because this book uses Python, an easily accessible language that has become one of the standards for cryptography implementation, you'll be able to quickly learn how to secure applications and data of all kinds. In this easy-to-read guide, well-known cybersecurity expert Shannon Bray walks you through creating secure communications in public channels using public-key cryptography. You'll also explore methods of authenticating messages to ensure that they haven't been tampered with in transit. Finally, you'll learn how to use digital signatures to let others verify the messages sent through your services.-Learn how to implement proven cryptographic tools, using easy-to-understand examples written in Python -Discover the history of cryptography and understand its critical importance in today's digital communication systems -Work through real-world examples to understand the pros and cons of various authentication methods -Protect your end-users and ensure that your applications and systems are using up-to-date cryptography. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Data encryption (Computer science) 
650 0 |a Python (Computer program language) 
650 6 |a Chiffrement (Informatique) 
650 6 |a Python (Langage de programmation) 
650 7 |a COMPUTERS  |x Security  |x Cryptography & Encryption.  |2 bisacsh 
650 7 |a Data encryption (Computer science)  |2 fast 
650 7 |a Python (Computer program language)  |2 fast 
758 |i has work:  |a Implementing cryptography using Python (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGvC4wxJTB6ttgwtYJjHmd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 1119612209  |z 9781119612209  |w (OCoLC)1107565520 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119612209/?ar  |z Texto completo 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6265337  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36964327 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36964322 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6265337 
938 |a EBSCOhost  |b EBSC  |n 2528576 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00831547 
938 |a YBP Library Services  |b YANK  |n 16850301 
994 |a 92  |b IZTAP