語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Practical Cryptography in Python = L...
~
Nielson, Seth James.
Practical Cryptography in Python = Learning Correct Cryptography by Example /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Practical Cryptography in Python/ by Seth James Nielson, Christopher K. Monson.
其他題名:
Learning Correct Cryptography by Example /
作者:
Nielson, Seth James.
其他作者:
Monson, Christopher K.
面頁冊數:
XV, 371 p. 39 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-1-4842-4900-0
ISBN:
9781484249000
Practical Cryptography in Python = Learning Correct Cryptography by Example /
Nielson, Seth James.
Practical Cryptography in Python
Learning Correct Cryptography by Example /[electronic resource] :by Seth James Nielson, Christopher K. Monson. - 1st ed. 2019. - XV, 371 p. 39 illus.online resource.
Chapter 1: Cryptography: More Than Secrecy -- Chapter 2: Hashing -- Chapter 3: Symmetric Encryption: Two Sides, One Key -- Chapter 4: Asymmetric Encryption: Public/Private Keys -- Chapter 5: Message Integrity, Signatures, and Certificates -- Chapter 6: Combining Asymmetric and Symmetric Algorithms -- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos -- Chapter 8: TLS Communications -- Bibliography.-.
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the life blood of the digital world’s security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You’ll Learn: Understand where cryptography is used, why, and how it gets misused Know what secure hashing is used for and its basic properties Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break Use message integrity and/or digital signatures to protect messages Utilize modern symmetric ciphers such as AES-GCM and CHACHA Practice the basics of public key cryptography, including ECDSA signatures Discover how RSA encryption can be broken if insecure padding is used Employ TLS connections for secure communications Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs.
ISBN: 9781484249000
Standard No.: 10.1007/978-1-4842-4900-0doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Practical Cryptography in Python = Learning Correct Cryptography by Example /
LDR
:03494nam a22003855i 4500
001
1004022
003
DE-He213
005
20200706130951.0
007
cr nn 008mamaa
008
210106s2019 xxu| s |||| 0|eng d
020
$a
9781484249000
$9
978-1-4842-4900-0
024
7
$a
10.1007/978-1-4842-4900-0
$2
doi
035
$a
978-1-4842-4900-0
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Nielson, Seth James.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1297410
245
1 0
$a
Practical Cryptography in Python
$h
[electronic resource] :
$b
Learning Correct Cryptography by Example /
$c
by Seth James Nielson, Christopher K. Monson.
250
$a
1st ed. 2019.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
XV, 371 p. 39 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1: Cryptography: More Than Secrecy -- Chapter 2: Hashing -- Chapter 3: Symmetric Encryption: Two Sides, One Key -- Chapter 4: Asymmetric Encryption: Public/Private Keys -- Chapter 5: Message Integrity, Signatures, and Certificates -- Chapter 6: Combining Asymmetric and Symmetric Algorithms -- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos -- Chapter 8: TLS Communications -- Bibliography.-.
520
$a
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the life blood of the digital world’s security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You’ll Learn: Understand where cryptography is used, why, and how it gets misused Know what secure hashing is used for and its basic properties Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break Use message integrity and/or digital signatures to protect messages Utilize modern symmetric ciphers such as AES-GCM and CHACHA Practice the basics of public key cryptography, including ECDSA signatures Discover how RSA encryption can be broken if insecure padding is used Employ TLS connections for secure communications Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs.
650
0
$a
Data protection.
$3
557764
650
0
$a
Python (Computer program language).
$3
1127623
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Python.
$3
1115944
700
1
$a
Monson, Christopher K.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1297411
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484248997
776
0 8
$i
Printed edition:
$z
9781484249017
856
4 0
$u
https://doi.org/10.1007/978-1-4842-4900-0
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login