Implementing cryptography using Python (Record no. 69307)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04405cam a2200469Ia 4500 |
001 - CONTROL NUMBER | |
control field | on1176314918 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711203610.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200723s2020 inu o 001 0 eng d |
019 ## - | |
-- | 1178642863 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119612216 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119612217 |
-- | (electronic bk. : oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119612223 |
-- | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1119612225 |
-- | (electronic bk.) |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8/24 |
100 1# - AUTHOR NAME | |
Author | Bray, Shannon, |
245 10 - TITLE STATEMENT | |
Title | Implementing cryptography using Python |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Indianapolis : |
Publisher | Wiley, |
Year of publication | 2020. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Cover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents at a Glance -- Contents -- Introduction -- Chapter 1 Introduction to Cryptography and Python -- Exploring Algorithms -- Why Use Python? -- Downloading and Installing Python -- Installing on Ubuntu -- Installing on macOS -- Installing on Windows -- Installing on a Chromebook -- Installing Additional Packages -- Installing Pip, NumPy, and Matplotlib -- Installing the Cryptography Package -- Installing Additional Packages -- Testing Your Install -- Diving into Python Basics -- Using Variables |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Using Strings -- Introducing Operators -- Understanding Arithmetic Operators -- Understanding Comparison Operators -- Understanding Logical Operators -- Understanding Assignment Operators -- Understanding Bitwise Operators -- Understanding Membership Operators -- Understanding Identity Operators -- Using Conditionals -- Using Loops -- for -- while -- continue -- break -- else -- Using Files -- Understanding Python Semantics -- Sequence Types -- Introducing Custom Functions -- Downloading Files Using Python -- Introducing Python Modules -- Creating a Reverse Cipher -- Summary |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Chapter 2 Cryptographic Protocols and Perfect Secrecy -- The Study of Cryptology -- Understanding Cryptography -- Cryptography's Famous Family: Alice and Bob -- Diffie-Hellman -- Data Origin Authentication -- Entity Authentication -- Symmetric Algorithms -- Asymmetric Algorithms -- The Needham-Schroeder Protocols -- The Otway-Rees Protocol -- Kerberos -- Multiple-Domain Kerberos -- X.509 -- Formal Validation of Cryptographic Protocols -- Configuring Your First Cryptographic Library -- Understanding Cryptanalysis -- Brute-Force Attacks -- Side-Channel Attacks -- Social Engineering |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Analytical Attacks -- Frequency Analysis -- Attack Models -- Shannon's Theorem -- One-Time Pad -- XOR, AND, and OR -- One-Time Pad Function -- One-Way Hashes -- Cryptographic One-Way Hashes -- Message Authentication Codes -- Perfect Forward Secrecy -- Published and Proprietary Encryption Algorithms -- Summary -- References -- Chapter 3 Classical Cryptography -- Password Best Practices -- Password Storage -- Hashing Passwords -- Salting Passwords -- Stretching Passwords -- Password Tools -- Obfuscating Data -- ASCII Encoding -- Base64 Encoding Text -- Binary Data -- Decoding -- Historical Ciphers |
505 8# - FORMATTED CONTENTS NOTE | |
Remark 2 | Scytale of Sparta -- Substitution Ciphers -- Caesar Cipher -- ROT-13 -- Atbash Cipher -- Vigenère Cipher -- Playfair -- Hill 2x2 -- Column Transposition -- Affine Cipher -- Summary -- Chapter 4 Cryptographic Math and Frequency Analysis -- Modular Arithmetic and the Greatest Common Devisor -- Prime Numbers -- Prime Number Theorem -- School Primality Test -- Fermat's Little Theorem -- Miller-Rabin Primality Test -- Generate Large Prime Numbers -- Basic Group Theory -- Orders of Elements -- Modular Inverses -- Fermat's Little Theorem to Find the Inverse -- Extending the GCD -- Euler's Theorem |
500 ## - GENERAL NOTE | |
Remark 1 | Includes index. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1002/9781119612216 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Python (Computer program language) |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.