• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
Practical cryptography in Python :

پدید آورنده
Seth James Nielson, Christopher K. Monson.

موضوع
Cryptography.,Data encryption (Computer science),Python (Computer program language),Cryptography.,Data encryption (Computer science),Python (Computer program language)

رده
QA76
.
9
.
A25

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1484249003
(Number (ISBN
9781484249000
Erroneous ISBN
9781484248997

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Practical cryptography in Python :
General Material Designation
[Book]
Other Title Information
learning correct cryptography by example /
First Statement of Responsibility
Seth James Nielson, Christopher K. Monson.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Berkeley, CA :
Name of Publisher, Distributor, etc.
Apress L.P.,
Date of Publication, Distribution, etc.
2019.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (380 pages)

CONTENTS NOTE

Text of Note
Chapter 1: Cryptography: More Than Secrecy -- Chapter 2: Hashing -- Chapter 3: Symmetric Encryption: Two Sides, One Key -- Chapter 4: Asymmetric Encryption: Public/Private Keys -- Chapter 5: Message Integrity, Signatures, and Certificates -- Chapter 6: Combining Asymmetric and Symmetric Algorithms -- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos -- Chapter 8: TLS Communications -- Bibliography.-
0

SUMMARY OR ABSTRACT

Text of Note
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the life blood of the digital worlds security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What Youll Learn: Understand where cryptography is used, why, and how it gets misused Know what secure hashing is used for and its basic properties Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break Use message integrity and/or digital signatures to protect messages Utilize modern symmetric ciphers such as AES-GCM and CHACHA Practice the basics of public key cryptography, including ECDSA signatures Discover how RSA encryption can be broken if insecure padding is used Employ TLS connections for secure communications Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs.

OTHER EDITION IN ANOTHER MEDIUM

Title
Practical Cryptography in Python : Learning Correct Cryptography by Example.
International Standard Book Number
9781484248997

TOPICAL NAME USED AS SUBJECT

Cryptography.
Data encryption (Computer science)
Python (Computer program language)
Cryptography.
Data encryption (Computer science)
Python (Computer program language)

DEWEY DECIMAL CLASSIFICATION

Number
005
.
824

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25

PERSONAL NAME - PRIMARY RESPONSIBILITY

Nielson, Seth James

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Monson, Christopher K.

ORIGINATING SOURCE

Date of Transaction
20200823032757.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival