Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Practical Cryptography in Python
Learning Correct Cryptography by Example
Taschenbuch von Christopher K. Monson (u. a.)
Sprache: Englisch

67,90 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 2-3 Wochen

Kategorien:
Beschreibung
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly.

Cryptography is the lifeblood of the digital world¿s security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand.
Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why.

What Yoüll LearnUnderstand where cryptography is used, why, and how it gets misused

Know what secure hashing is used for and its basic properties
Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break
Use message integrity and/or digital signatures to protect messages
Utilize modern symmetric ciphers such as AES-GCM and CHACHA
Practice the basics of public key cryptography, including ECDSA signatures
Discover how RSA encryption can be broken if insecure padding is used
Employ TLS connections for secure communications
Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs

Who This Book Is For

IT administrators and software developers familiar with Python. Although readers may have some knowledge of cryptography, the book assumes that the reader is starting from scratch.
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly.

Cryptography is the lifeblood of the digital world¿s security infrastructure. From governments around the world to the average consumer, most communications are protected in some form or another by cryptography. These days, even Google searches are encrypted. Despite its ubiquity, cryptography is easy to misconfigure, misuse, and misunderstand.
Developers building cryptographic operations into their applications are not typically experts in the subject, and may not fully grasp the implication of different algorithms, modes, and other parameters. The concepts in this book are largely taught by example, including incorrect uses of cryptography and how "bad" cryptography can be broken. By digging into the guts of cryptography, you can experience what works, what doesn't, and why.

What Yoüll LearnUnderstand where cryptography is used, why, and how it gets misused

Know what secure hashing is used for and its basic properties
Get up to speed on algorithms and modes for block ciphers such as AES, and see how bad configurations break
Use message integrity and/or digital signatures to protect messages
Utilize modern symmetric ciphers such as AES-GCM and CHACHA
Practice the basics of public key cryptography, including ECDSA signatures
Discover how RSA encryption can be broken if insecure padding is used
Employ TLS connections for secure communications
Find out how certificates work and modern improvements such as certificate pinning and certificate transparency (CT) logs

Who This Book Is For

IT administrators and software developers familiar with Python. Although readers may have some knowledge of cryptography, the book assumes that the reader is starting from scratch.
Über den Autor

Dr. Seth James Nielson is the founder and chief scientist of Crimson Vista, Inc., a boutique computer security research and consulting company. He is also an adjunct professor at Johns Hopkins University where he teaches network security and has also served as the director of advanced research projects at the Information Security Institute. As part of his Hopkins work, he co-founded the [...] knowledge base, through a generous grant from Cisco.

Christopher K. Monson has a PhD in machine learning, and has spent over a decade at Google in various engineering, machine learning, and leadership roles. He has broad experience writing and teaching programming courses in multiple languages, and has worked in document password recovery, malware detection, and large-scale secure computing. He is currently serving as the chief technology officer at Data Machines Corp. and teaches cloud computing security as a lecturer at the Johns Hopkins University Information Security Institute.

Zusammenfassung

Teaches you the basics of writing Python programs that use cryptography

Offers clear guidance on the correct use of cryptography in a landscape where good advice is hard to come by

Provides examples of bad cryptography along with source code that breaks it

Inhaltsverzeichnis

Chapter 1: Cryptography: More Than Secrecy.- Chapter 2: Hashing.- Chapter 3: Symmetric Encryption: Two Sides, One Key.- Chapter 4: Asymmetric Encryption: Public/Private Keys.- Chapter 5: Message Integrity, Signatures, and Certificates.- Chapter 6: Combining Asymmetric and Symmetric Algorithms.- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos.- Chapter 8: TLS Communications.- Bibliography.-

Details
Erscheinungsjahr: 2019
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: xv
371 S.
39 s/w Illustr.
371 p. 39 illus.
ISBN-13: 9781484248997
ISBN-10: 1484248996
Sprache: Englisch
Herstellernummer: 978-1-4842-4899-7
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Monson, Christopher K.
Nielson, Seth James
Auflage: 1st ed.
Hersteller: Apress
Apress L.P.
Verantwortliche Person für die EU: Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de
Maße: 254 x 178 x 21 mm
Von/Mit: Christopher K. Monson (u. a.)
Erscheinungsdatum: 27.09.2019
Gewicht: 0,728 kg
Artikel-ID: 116008830
Über den Autor

Dr. Seth James Nielson is the founder and chief scientist of Crimson Vista, Inc., a boutique computer security research and consulting company. He is also an adjunct professor at Johns Hopkins University where he teaches network security and has also served as the director of advanced research projects at the Information Security Institute. As part of his Hopkins work, he co-founded the [...] knowledge base, through a generous grant from Cisco.

Christopher K. Monson has a PhD in machine learning, and has spent over a decade at Google in various engineering, machine learning, and leadership roles. He has broad experience writing and teaching programming courses in multiple languages, and has worked in document password recovery, malware detection, and large-scale secure computing. He is currently serving as the chief technology officer at Data Machines Corp. and teaches cloud computing security as a lecturer at the Johns Hopkins University Information Security Institute.

Zusammenfassung

Teaches you the basics of writing Python programs that use cryptography

Offers clear guidance on the correct use of cryptography in a landscape where good advice is hard to come by

Provides examples of bad cryptography along with source code that breaks it

Inhaltsverzeichnis

Chapter 1: Cryptography: More Than Secrecy.- Chapter 2: Hashing.- Chapter 3: Symmetric Encryption: Two Sides, One Key.- Chapter 4: Asymmetric Encryption: Public/Private Keys.- Chapter 5: Message Integrity, Signatures, and Certificates.- Chapter 6: Combining Asymmetric and Symmetric Algorithms.- Chapter 7: More Symmetric Crypto: Authenticated Encryption and Kerberos.- Chapter 8: TLS Communications.- Bibliography.-

Details
Erscheinungsjahr: 2019
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: xv
371 S.
39 s/w Illustr.
371 p. 39 illus.
ISBN-13: 9781484248997
ISBN-10: 1484248996
Sprache: Englisch
Herstellernummer: 978-1-4842-4899-7
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Monson, Christopher K.
Nielson, Seth James
Auflage: 1st ed.
Hersteller: Apress
Apress L.P.
Verantwortliche Person für die EU: Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de
Maße: 254 x 178 x 21 mm
Von/Mit: Christopher K. Monson (u. a.)
Erscheinungsdatum: 27.09.2019
Gewicht: 0,728 kg
Artikel-ID: 116008830
Sicherheitshinweis