Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Practical cryptography in Python = l...
~
Nielson, Seth James.
Linked to FindBook
Google Book
Amazon
博客來
Practical cryptography in Python = learning correct cryptography by example /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Practical cryptography in Python/ by Seth James Nielson, Christopher K. Monson.
Reminder of title:
learning correct cryptography by example /
Author:
Nielson, Seth James.
other author:
Monson, Christopher K.
Published:
Berkeley, CA :Apress : : 2019.,
Description:
xv, 371 p. :ill., digital ;24 cm.
[NT 15003449]:
Chapter 1: Cryptography: More Than Secrecy -- Chapter 2: Hashing -- Chapter 3: Symmetric Encryption: Two Sides, One Key -- Chapter 4: Asymmetric Encryption: Public/Private Keys -- Chapter 5: Message Integrity, Signatures, and Certificates -- Chapter 6: Combining Asymmetric and Symmetric Algorithms -- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos -- Chapter 8: TLS Communications -- Bibliography.
Contained By:
Springer eBooks
Subject:
Data encryption (Computer science) -
Online resource:
https://doi.org/10.1007/978-1-4842-4900-0
ISBN:
9781484249000
Practical cryptography in Python = learning correct cryptography by example /
Nielson, Seth James.
Practical cryptography in Python
learning correct cryptography by example /[electronic resource] :by Seth James Nielson, Christopher K. Monson. - Berkeley, CA :Apress :2019. - xv, 371 p. :ill., digital ;24 cm.
Chapter 1: Cryptography: More Than Secrecy -- Chapter 2: Hashing -- Chapter 3: Symmetric Encryption: Two Sides, One Key -- Chapter 4: Asymmetric Encryption: Public/Private Keys -- Chapter 5: Message Integrity, Signatures, and Certificates -- Chapter 6: Combining Asymmetric and Symmetric Algorithms -- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos -- Chapter 8: TLS Communications -- Bibliography.
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the life blood of the digital world's security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You'll Learn: Understand where cryptography is used, why, and how it gets misused Know what secure hashing is used for and its basic properties Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break Use message integrity and/or digital signatures to protect messages Utilize modern symmetric ciphers such as AES-GCM and CHACHA Practice the basics of public key cryptography, including ECDSA signatures Discover how RSA encryption can be broken if insecure padding is used Employ TLS connections for secure communications Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs.
ISBN: 9781484249000
Standard No.: 10.1007/978-1-4842-4900-0doiSubjects--Topical Terms:
579162
Data encryption (Computer science)
LC Class. No.: QA76.9.A25 / N545 2019
Dewey Class. No.: 005.824
Practical cryptography in Python = learning correct cryptography by example /
LDR
:03192nmm a2200325 a 4500
001
2193393
003
DE-He213
005
20191224142409.0
006
m d
007
cr nn 008maaau
008
200514s2019 cau s 0 eng d
020
$a
9781484249000
$q
(electronic bk.)
020
$a
9781484248997
$q
(paper)
024
7
$a
10.1007/978-1-4842-4900-0
$2
doi
035
$a
978-1-4842-4900-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
N545 2019
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
N669 2019
100
1
$a
Nielson, Seth James.
$3
3414532
245
1 0
$a
Practical cryptography in Python
$h
[electronic resource] :
$b
learning correct cryptography by example /
$c
by Seth James Nielson, Christopher K. Monson.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
xv, 371 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Cryptography: More Than Secrecy -- Chapter 2: Hashing -- Chapter 3: Symmetric Encryption: Two Sides, One Key -- Chapter 4: Asymmetric Encryption: Public/Private Keys -- Chapter 5: Message Integrity, Signatures, and Certificates -- Chapter 6: Combining Asymmetric and Symmetric Algorithms -- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos -- Chapter 8: TLS Communications -- Bibliography.
520
$a
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the life blood of the digital world's security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You'll Learn: Understand where cryptography is used, why, and how it gets misused Know what secure hashing is used for and its basic properties Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break Use message integrity and/or digital signatures to protect messages Utilize modern symmetric ciphers such as AES-GCM and CHACHA Practice the basics of public key cryptography, including ECDSA signatures Discover how RSA encryption can be broken if insecure padding is used Employ TLS connections for secure communications Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs.
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Cryptography.
$3
532586
650
0
$a
Python (Computer program language)
$3
729789
650
1 4
$a
Security.
$3
3134865
650
2 4
$a
Python.
$3
3201289
700
1
$a
Monson, Christopher K.
$3
3414533
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-4900-0
950
$a
Professional and Applied Computing (Springer-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9375683
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 N545 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login