Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Buy

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You’ll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today’s online transactions, including digital signatures, email, and Bitcoin.

Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you’ll have learned how to code in Python and you’ll have the clever programs to prove it!

You’ll also learn how to:

- Combine loops, variables, and flow control statements into real working programs
- Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish
- Create test programs to make sure that your code encrypts and decrypts correctly
- Code (and hack!) a working example of the affine cipher, which uses modular arithmetic to encrypt a message
- Break ciphers with techniques such as brute-force and frequency analysis

There’s no better way to learn to code than to play with real programs. Cracking Codes with Python makes the learning fun!

(HTML tags aren't allowed.)

Matthew's Enigma: A Father's Portrait of His Autistic Son
Matthew's Enigma: A Father's Portrait of His Autistic Son

Matthew's Enigma unfolds the complex relationship between a father, who is a Romanian emigré and distinguished university professor, and his son, who was diagnosed with autism when he was 7 years old. Matei Calinescu's desire to understand Matthew -- his namesake -- is the theme of this moving memoir. Calinescu's determined...

Interface Oriented Design
Interface Oriented Design
Interface-Oriented Design explores how you can develop software with interfaces that interact with each other. We’ll look at techniques for breaking down solutions into these interacting interfaces and then for determining appropriate implementations for these interfaces to create well-structured...
Introducing Silverlight 4
Introducing Silverlight 4

Introducing Silverlight 4 brings you up to speed with the latest version of Silverlight quickly and efficiently. The book builds off your understanding of the basics of .NET coding and WPF, allowing your journey to Silverlight 4 proficiency to be as quick and painless as possible. The text highlights where coding techniques are...


Shadow Algorithms Data Miner
Shadow Algorithms Data Miner

Shadow Algorithms Data Miner provides a high-level understanding of the complete set of shadow concepts and algorithms, addressing their usefulness from a larger graphics system perspective. It discusses the applicability and limitations of all the direct illumination approaches for shadow generation.

...

Human Physiology: The Basis of Medicine (Oxford Core Texts)
Human Physiology: The Basis of Medicine (Oxford Core Texts)
A sound understanding of physiology underpins good medical practice. This established textbook provides medical students and others in health-related disciplines with the essential information and learning tools necessary to understand human physiology. The book adopts a student-friendly style with an emphasis on clarity, explanation and...
Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Determining the identity of a person is becoming critical in our vastly interconnected
information society. As increasing number of biometrics-based identification systems
are being deployed for many civilian and forensic applications, biometrics and its
applications have evoked considerable interest. The current state of affairs is
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy