Implementing cryptography using Python (Record no. 69307)

000 -LEADER
fixed length control field 04405cam a2200469Ia 4500
001 - CONTROL NUMBER
control field on1176314918
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203610.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200723s2020 inu o 001 0 eng d
019 ## -
-- 1178642863
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119612216
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119612217
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119612223
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119612225
-- (electronic bk.)
082 04 - CLASSIFICATION NUMBER
Call Number 005.8/24
100 1# - AUTHOR NAME
Author Bray, Shannon,
245 10 - TITLE STATEMENT
Title Implementing cryptography using Python
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Indianapolis :
Publisher Wiley,
Year of publication 2020.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Cover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- Chapter 1 Introduction to Cryptography and Python -- Exploring Algorithms -- Why Use Python? -- Downloading and Installing Python -- Installing on Ubuntu -- Installing on macOS -- Installing on Windows -- Installing on a Chromebook -- Installing Additional Packages -- Installing Pip, NumPy, and Matplotlib -- Installing the Cryptography Package -- Installing Additional Packages -- Testing Your Install -- Diving into Python Basics -- Using Variables
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Using Strings -- Introducing Operators -- Understanding Arithmetic Operators -- Understanding Comparison Operators -- Understanding Logical Operators -- Understanding Assignment Operators -- Understanding Bitwise Operators -- Understanding Membership Operators -- Understanding Identity Operators -- Using Conditionals -- Using Loops -- for -- while -- continue -- break -- else -- Using Files -- Understanding Python Semantics -- Sequence Types -- Introducing Custom Functions -- Downloading Files Using Python -- Introducing Python Modules -- Creating a Reverse Cipher -- Summary
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Analytical Attacks -- Frequency Analysis -- Attack Models -- Shannon's Theorem -- One-Time Pad -- XOR, AND, and OR -- One-Time Pad Function -- One-Way Hashes -- Cryptographic One-Way Hashes -- Message Authentication Codes -- Perfect Forward Secrecy -- Published and Proprietary Encryption Algorithms -- Summary -- References -- Chapter 3 Classical Cryptography -- Password Best Practices -- Password Storage -- Hashing Passwords -- Salting Passwords -- Stretching Passwords -- Password Tools -- Obfuscating Data -- ASCII Encoding -- Base64 Encoding Text -- Binary Data -- Decoding -- Historical Ciphers
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Scytale of Sparta -- Substitution Ciphers -- Caesar Cipher -- ROT-13 -- Atbash Cipher -- Vigenère Cipher -- Playfair -- Hill 2x2 -- Column Transposition -- Affine Cipher -- Summary -- Chapter 4 Cryptographic Math and Frequency Analysis -- Modular Arithmetic and the Greatest Common Devisor -- Prime Numbers -- Prime Number Theorem -- School Primality Test -- Fermat's Little Theorem -- Miller-Rabin Primality Test -- Generate Large Prime Numbers -- Basic Group Theory -- Orders of Elements -- Modular Inverses -- Fermat's Little Theorem to Find the Inverse -- Extending the GCD -- Euler's Theorem
500 ## - GENERAL NOTE
Remark 1 Includes index.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119612216
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Python (Computer program language)
994 ## -
-- 92
-- DG1

No items available.