Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Buy

Learn to evaluate and compare data encryption methods and attack cryptographic systems

Key Features

  • Explore popular and important cryptographic methods
  • Compare cryptographic modes and understand their limitations
  • Learn to perform attacks on cryptographic systems

Book Description

Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly.

Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA).

By the end of this book, you will be able to deal with common errors in encryption.

What you will learn

  • Protect data with encryption and hashing
  • Explore and compare various encryption methods
  • Encrypt data using the Caesar Cipher technique
  • Make hashes and crack them
  • Learn how to use three NIST-recommended systems: AES, SHA, and RSA
  • Understand common errors in encryption and exploit them

Who This Book Is For

Hands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.

Table of Contents

  1. Obfuscation
  2. Hashing
  3. Strong Encryption
(HTML tags aren't allowed.)

Programming Abstractions in C++
Programming Abstractions in C++

This text is intended for use in the second programming course

 

Programming is a matter of learning by doing. Eric Roberts’ Programming Abstractions in C++ gives students opportunities to practice and learn with...

Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Data Communications and Computer Networks: A Business User's Approach
Data Communications and Computer Networks: A Business User's Approach

Data communications and computer networks are vital in today's business world. Whether your career entails business management, computer programming, system design, or a related area, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 7th Edition will give you the thorough understanding you need of basic features, operations, and limitations...


Quicken 2009: The Missing Manual
Quicken 2009: The Missing Manual

Quicken is a convenient way to keep track of personal finances, but many people are unaware of Quicken's power and end up using only the basic features. Sometimes Quicken raises more questions than it answers: Return of capital from stock? Net worth? What are they and why do you need to know about them? Luckily, Quicken 2009:...

Drupal 8 Configuration Management
Drupal 8 Configuration Management

Make the most of Drupal 8's coolest new feature―the Configuration Management system

About This Book

  • Understand Configuration Management from a non-developer perspective
  • Achieve a faster moving configuration between environments
  • Create custom configuration inside...
Ghosts of Atlantis: How the Echoes of Lost Civilizations Influence Our Modern World
Ghosts of Atlantis: How the Echoes of Lost Civilizations Influence Our Modern World
An intensive investigation into the evidence for a forgotten fountainhead of civilization lost at the end of the last ice age

• Reveals evidence of advanced ancient technology, anomalous ancient maps, time travel, crystal science, ancient Armageddon, and Atlantis in the Bible

• Explores the true
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy