Practical Cryptography in Python Learning Correct Cryptography by Example /

Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the life blood of the digital world's s...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Nielson, Seth James (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Monson, Christopher K. (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2019.
Έκδοση:1st ed. 2019.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03929nam a2200457 4500
001 978-1-4842-4900-0
003 DE-He213
005 20190926232454.0
007 cr nn 008mamaa
008 190926s2019 xxu| s |||| 0|eng d
020 |a 9781484249000  |9 978-1-4842-4900-0 
024 7 |a 10.1007/978-1-4842-4900-0  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Nielson, Seth James.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Practical Cryptography in Python  |h [electronic resource] :  |b Learning Correct Cryptography by Example /  |c by Seth James Nielson, Christopher K. Monson. 
250 |a 1st ed. 2019. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2019. 
300 |a XV, 371 p. 39 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1: Cryptography: More Than Secrecy -- Chapter 2: Hashing -- Chapter 3: Symmetric Encryption: Two Sides, One Key -- Chapter 4: Asymmetric Encryption: Public/Private Keys -- Chapter 5: Message Integrity, Signatures, and Certificates -- Chapter 6: Combining Asymmetric and Symmetric Algorithms -- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos -- Chapter 8: TLS Communications -- Bibliography.-. 
520 |a Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the life blood of the digital world's security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand. Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why. What You'll Learn: Understand where cryptography is used, why, and how it gets misused Know what secure hashing is used for and its basic properties Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break Use message integrity and/or digital signatures to protect messages Utilize modern symmetric ciphers such as AES-GCM and CHACHA Practice the basics of public key cryptography, including ECDSA signatures Discover how RSA encryption can be broken if insecure padding is used Employ TLS connections for secure communications Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs. 
650 0 |a Data protection. 
650 0 |a Python (Computer program language). 
650 1 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
650 2 4 |a Python.  |0 http://scigraph.springernature.com/things/product-market-codes/I29080 
700 1 |a Monson, Christopher K.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781484248997 
776 0 8 |i Printed edition:  |z 9781484249017 
856 4 0 |u https://doi.org/10.1007/978-1-4842-4900-0  |z Full Text via HEAL-Link 
912 |a ZDB-2-CWD 
950 |a Professional and Applied Computing (Springer-12059)